Syndicated Blog

Sectrio
Proven OT, IoT and 5G protection
QILIN Ransomware Report 

QILIN Ransomware Report 

| | FEATURED, ICS, OT
QILIN also known as “Agenda” is a Ransomware Group that also provides Ransomware as a service (Raas). Qilin’s ransomware-as-a-service (RaaS) scheme earns anywhere between 80% to 85% of each ransom payment, according ...
Why the new AI cybercrime tool is just the tip of the iceberg

Why the new AI cybercrime tool is just the tip of the iceberg

| | FEATURED, ICS, OT
Recent reports about the appearance of a new generative AI tool point to the levels of maturity that hackers have attained as far as leveraging AI is concerned. In the latest edition ...
Looking ahead of CEA guidelines to secure the power sector in India

Looking ahead of CEA guidelines to secure the power sector in India

| | FEATURED, OT, Utilities
India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured ...
Ensuring Secure Remote Access for Industrial Control Systems

Ensuring Secure Remote Access for Industrial Control Systems

| | FEATURED, ICS, OT
You may also be interested in reading: Industrial control systems (ICS) refer to control systems used in a wide range of industrial processes. It’s a component of operation technology that involves hardware, ...
Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group

Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group

Who is Black Basta? Black Basta (AKA BlackBasta) is a ransomware operator and Ransomware-as-a-Service (RaaS) criminal enterprise that first emerged in early 2022 and immediately became one of the most active RaaS ...
Deciphering the latest attack on AIIMS    

Deciphering the latest attack on AIIMS    

In the latest edition of our threat landscape report, Sectrio’s threat researchers had done a comprehensive analysis of the Indian cyber threat landscape, the actors, tactics, malware, and enablers. This report also ...
Essential security practices in OT control systems

Essential security practices in OT control systems

| | FEATURED, ICS, OT
Operational Technology (OT) security controls include the measures, workflows and procedures put in place to protect various OT systems from cyber threats. OT systems are used to control, run and monitor critical ...
Threat Hunting in OT Networks: Unleashing Proactive Cybersecurity

Threat Hunting in OT Networks: Unleashing Proactive Cybersecurity

| | FEATURED, ICS, OT
With the increasing digitization and connectivity of operational technology (OT) networks, the threat landscape has expanded, making it imperative for organizations to proactively hunt for potential cyber threats. Threat hunting in OT ...
How to implement micro segmentation in an OT environment

How to implement micro segmentation in an OT environment

| | FEATURED, ICS, OT
Micro segmentation is a proven security strategy that works by dividing a network into much smaller and more secure segments. This helps in limiting the spread of a cyberattack in case of ...
Best practices for an OT patch management program

Best practices for an OT patch management program

| | FEATURED, ICS, OT
Having an OT Patch management program is critical from a security and operational perspective for industries in manufacturing or critical infrastructure. A comprehensive patch management program is an integral part of an ...