QILIN Ransomware Report 

QILIN Ransomware Report 

| | FEATURED, ICS, OT
QILIN also known as “Agenda” is a Ransomware Group that also provides Ransomware as a service (Raas). Qilin’s ransomware-as-a-service (RaaS) scheme earns anywhere between 80% to 85% of each ransom payment, according ...
Why the new AI cybercrime tool is just the tip of the iceberg

Why the new AI cybercrime tool is just the tip of the iceberg

| | FEATURED, ICS, OT
Recent reports about the appearance of a new generative AI tool point to the levels of maturity that hackers have attained as far as leveraging AI is concerned. In the latest edition ...
Solar array, ground mounted in field, under blue sky

Contec SolarView: Critical Bug Unpatched After 14 MONTHS

PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems ...
Security Boulevard
Looking ahead of CEA guidelines to secure the power sector in India

Looking ahead of CEA guidelines to secure the power sector in India

| | FEATURED, OT, Utilities
India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured ...
MITRE Splunk DLL sideloading ransomware Iran cybersecurity attack Security

Enterprises Unprepared to Defend Against MITRE ATT&CK Techniques

Enterprises lack detections for more than three-quarters of all MITRE ATT&CK techniques, while 12% of SIEM rules are broken and will never fire due to data quality issues including misconfigured data sources ...
Security Boulevard
critical infrastructure cyberinfrastructure Teleport GitOps zero-trust immutable infrastructure

Critical Infrastructure Security Needs an Overhaul

The security policies underpinning the nation’s critical infrastructure sectors and protecting them from cyberattacks are outdated and require comprehensive overhaul, according to a recent report by the Cyberspace Solarium Commission 2.0. According ...
Security Boulevard
Ensuring Secure Remote Access for Industrial Control Systems

Ensuring Secure Remote Access for Industrial Control Systems

| | FEATURED, ICS, OT
You may also be interested in reading: Industrial control systems (ICS) refer to control systems used in a wide range of industrial processes. It’s a component of operation technology that involves hardware, ...
Palo Alto Networks Hunters threat hunting

Palo Alto Networks Finds Cyberattack Patterns Changing

An analysis of cyberattacks published by the Unit 42 research arm of Palo Alto Networks found a significant increase in attempts to mimic generative artificial intelligence (AI) sites on the web using ...
Security Boulevard
Critical Infrastructure Attacks: New Rules, New Game

Critical Infrastructure Attacks: New Rules, New Game

| | Blog, iot, OT
Critical infrastructure lacking proper protection leaves itself open to a greater number of increasingly sophisticated cyberattacks. Cybercrime is a business: Low-level threat actors root out opportunities to sell to high-level bidders, who ...
Essential security practices in OT control systems

Essential security practices in OT control systems

| | FEATURED, ICS, OT
Operational Technology (OT) security controls include the measures, workflows and procedures put in place to protect various OT systems from cyber threats. OT systems are used to control, run and monitor critical ...