• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Indian Energy Company Tata Power’s IT Infrastructure Hit By Cyber Attack

You are here: Home / General Cyber Security News / Indian Energy Company Tata Power’s IT Infrastructure Hit By Cyber Attack
October 15, 2022

Tata Energy Organization Constrained, India’s premier integrated electricity enterprise, on Friday verified it was focused by a cyberattack.

The intrusion on IT infrastructure impacted “some of its IT methods,” the organization mentioned in a filing with the Nationwide Inventory Exchange (NSE) of India.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

It even further stated it has taken measures to retrieve and restore the afflicted equipment, incorporating it place in put security guardrails for client-dealing with portals to protect against unauthorized access.

The Mumbai-based electric powered utility company, element of the Tata Group conglomerate, did not disclose any more particulars about the character of the attack, or when it took place.

That mentioned, cybersecurity organization Recorded Long run in April disclosed attacks mounted by China-joined adversaries concentrating on Indian power grid organizations.

The network intrusions are claimed to have been aimed at “at minimum seven Indian State Load Despatch Centres (SLDCs) dependable for carrying out actual-time operations for grid control and energy dispatch within just these respective states.”

CyberSecurity

The attacks were being attributed to an emerging risk cluster Recorded Long term is monitoring beneath the name Danger Exercise Team 38 (TAG-38).

The enterprise even more assessed that the targeting is intended to aid info accumulating relevant to critical infrastructure property or is likely a precursor for foreseeable future pursuits.

China refuted the allegations that it was associated, stating “lots of of U.S. allies or nations around the world with which it cooperates on cybersecurity are also victims of U.S. cyberattacks.”

Uncovered this write-up fascinating? Adhere to THN on Facebook, Twitter  and LinkedIn to read through more exceptional content we publish.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «researchers reveal detail for windows zero day vulnerability patched last month Researchers Reveal Detail for Windows Zero-Day Vulnerability Patched Last Month
Next Post: INTERPOL-led Operation Takes Down ‘Black Axe’ Cyber Crime Organization interpol led operation takes down 'black axe' cyber crime organization»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies
  • Update Chrome Now: Google Releases Patch for Actively Exploited Zero-Day Vulnerability

Copyright © TheCyberSecurity.News, All Rights Reserved.