QILIN Ransomware Report 

QILIN Ransomware Report 

| | FEATURED, ICS, OT
QILIN also known as “Agenda” is a Ransomware Group that also provides Ransomware as a service (Raas). Qilin’s ransomware-as-a-service (RaaS) scheme earns anywhere between 80% to 85% of each ransom payment, according to new Group-IB findings. It was first discovered in 2022 when it attacked Australia’s leading Information technology service ... Read More
Ensuring Secure Remote Access for Industrial Control Systems

Ensuring Secure Remote Access for Industrial Control Systems

| | FEATURED, ICS, OT
You may also be interested in reading: Industrial control systems (ICS) refer to control systems used in a wide range of industrial processes. It’s a component of operation technology that involves hardware, software, and systems that help manage industrial operations. Some basic aspects of ICS include sensors, controllers, local supervisory ... Read More
Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group

Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group

Who is Black Basta? Black Basta (AKA BlackBasta) is a ransomware operator and Ransomware-as-a-Service (RaaS) criminal enterprise that first emerged in early 2022 and immediately became one of the most active RaaS threat actors in the world, racking up 19 prominent enterprise victims and more than 100 confirmed victims in ... Read More
Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

| | Cyber Security, iot, OT
On March 8th, 2023, the Transportation Security Administration (TSA) announced a new and important cybersecurity amendment to the security programs of certain TSA-regulated airports and aircraft operators in the US. This emergency action follows a similar set of measures announced in October 2022 for passenger and freight railroad carriers. The ... Read More
The cybersecurity link to the Chinese spy balloon episode

The cybersecurity link to the Chinese spy balloon episode

| | Cyber Security, iot, OT
In the last eight days, US fighter jets have eliminated 4 Chinese spy balloons. The fourth one was shot along the border of Alaska and Canada last Saturday.  The US Defense Department has attributed the increase in the detection – and shoot-downs – of suspicious flying objects to increased scrutiny ... Read More
Complete Guide to Zero Trust Security

Complete Guide to Zero Trust Security

| | Cyber Security, iot, OT
Zero Trust Security – Always Verify and Authenticate Zero Trust Security architecture functions on the premise that any connection requires mandatory identification, verification, and authentication. Previously, networks were potentially secure from outside threats. At the same time, those inside the system had complete access to every nook and corner of ... Read More
2023 will be an important year for cybersecurity in India

2023 will be an important year for cybersecurity in India

| | Cyber Security, iot, OT
In addition to the heightened attention the country is receiving from hackers and hacktivists, there are chances of data stolen in 2022 being weaponized this year. IoT and OT Cybersecurity predictions for India for 2023 are based on the trends we have observed in India’s digital space over the last ... Read More
Specific IoT and OT security predictions for North America for 2023

Specific IoT and OT security predictions for North America for 2023

| | Cyber Security, iot, OT
The year 2023 will see a significant shift in the way cyberattacks are engineered and that is just a start. To help you understand how things will change in 2023, we have distilled our learning from the last 4 years and the threat intelligence gathered from our global threat research ... Read More
Complete guide to OT network segmentation

Complete guide to OT network segmentation

| | ICS, OT
As industrial businesses connect their OT and IT networks, network segmentation is becoming an increasingly important approach. Using this method, it is feasible to successfully secure industrial assets while maintaining their important characteristics. Data reigns supremacy in the era of the Industrial 4.0 Revolution. In some of our most important ... Read More

Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS) 

The news of the All India Institute of Medical Sciences (AIIMS) servers being breached is making headlines across India. While the full extent of the data that was compromised and the actors who are behind it are still unknown, we do have some clues on what this attack entails for ... Read More
Loading...