Ukrainian energy facilities ‘hit by Russian cyber attacks’

Ukrainian authorities have claimed that hackers targeted computers controlling high voltage substations

US charges four Russian hackers for targeting energy infrastructure

Russian nationals allegedly ‘hacked computers of hundreds of entities’ related to the global energy sector

Digital replica of the UK grid gets financial backing

The ‘digital twin’ aims to help decarbonise the existing energy system

Vestas admits hackers leaked its stolen data

The Danish group said the leaked data was concerned with ‘internal matters’

Hackers attack wind turbine manufacturer Vestas

The wind turbine giant was forced to shut down its IT systems across various business units

Energy industry ‘most-hit’ for mobile phishing attacks

A new report found that the number of attacks rose by 161% in the last year

UK energy sector ‘faces the highest risk of cyber attack’

The industry had a median loss of more than £25,000 in the last year, according to a new report

‘Cybersecurity to be biggest tech in next three years’

Energy companies expect cyber security to be the biggest technology to be adopted in the sector over the next three years, as the industry becomes increasingly digitalised

Cyber attack training scenario hits energy sector

A cyber security training programme has been launched to help the energy sector defend itself against people trying to hack its systems and damage vital infrastructure. The European Network for Cyber Security’s (ENCS) training casts participants as hackers and defenders in a live attack scenario upon an electricity grid, using a simulated company called Gridnet. […]

UK’s critical services ‘skipping cyber guidelines’

Up to 39% of critical infrastructure organisations in the UK, including energy firms, have not completed basic cyber security standards. That’s according to Corero Network Security (CNS), a provider of Distributed Denial of Service (DDoS) defence solutions, which uncovered this information through 338 Freedom of Information requests. A DDoS attack involves making a machine or […]