ICS
QILIN Ransomware Report
QILIN also known as “Agenda” is a Ransomware Group that also provides Ransomware as a service (Raas). Qilin’s ransomware-as-a-service (RaaS) scheme earns anywhere between 80% to 85% of each ransom payment, according ...
Why the new AI cybercrime tool is just the tip of the iceberg
Recent reports about the appearance of a new generative AI tool point to the levels of maturity that hackers have attained as far as leveraging AI is concerned. In the latest edition ...
Contec SolarView: Critical Bug Unpatched After 14 MONTHS
PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems ...
Enterprises Unprepared to Defend Against MITRE ATT&CK Techniques
Enterprises lack detections for more than three-quarters of all MITRE ATT&CK techniques, while 12% of SIEM rules are broken and will never fire due to data quality issues including misconfigured data sources ...
Critical Infrastructure Security Needs an Overhaul
The security policies underpinning the nation’s critical infrastructure sectors and protecting them from cyberattacks are outdated and require comprehensive overhaul, according to a recent report by the Cyberspace Solarium Commission 2.0. According ...
Ensuring Secure Remote Access for Industrial Control Systems
You may also be interested in reading: Industrial control systems (ICS) refer to control systems used in a wide range of industrial processes. It’s a component of operation technology that involves hardware, ...
Essential security practices in OT control systems
Operational Technology (OT) security controls include the measures, workflows and procedures put in place to protect various OT systems from cyber threats. OT systems are used to control, run and monitor critical ...
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Shouty name—dangerous game. Red-team tool ripe for misuse ...
Threat Hunting in OT Networks: Unleashing Proactive Cybersecurity
With the increasing digitization and connectivity of operational technology (OT) networks, the threat landscape has expanded, making it imperative for organizations to proactively hunt for potential cyber threats. Threat hunting in OT ...
How to implement micro segmentation in an OT environment
Micro segmentation is a proven security strategy that works by dividing a network into much smaller and more secure segments. This helps in limiting the spread of a cyberattack in case of ...