OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide

OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide

Have you ever wondered about the hidden chinks in the armor of your operational technology systems? In the interconnected web of technology, where the digital landscape extends its reach into every corner ...
Top 10 open source projects hit by HTTP/2 'Rapid Reset' zero-day

Top 10 open source projects hit by HTTP/2 ‘Rapid Reset’ zero-day

Executive summary In this blog post we list at least 10 open source packages affected by the HTTP/2 'Rapid Reset' vulnerability, disclosed by Cloudflare this week ...
EMM-screenshot-01

Introducing the SaaS Event Maturity Matrix (EMM)

Learn about the Threat Detection framework for assessing SaaS audit logging from different SaaS platforms commonly used by enterprises. The post Introducing the SaaS Event Maturity Matrix (EMM) appeared first on AppOmni ...

SaaS Security in Healthcare: What You Need to Know

The migration to SaaS has resulted in the distribution of valuable data across a number of highly decentralized cloud applications. While the security impact of this shift can be felt across all ...
Shared Responsibility-02

Breaking Down APRA CPS 230 Critical SaaS Operations Compliance

Learn how APRA CPS 230 mandates affect your cloud and SaaS stack, along with actionable steps to take to achieve compliance starting in July 2025. The post Breaking Down APRA CPS 230 ...
Introducing our 9th annual State of the Software Supply Chain report

Introducing our 9th annual State of the Software Supply Chain report

In our fast-paced digital world, striving for excellence is an ongoing journey marked by the relentless pursuit of innovation, efficiency, and a focus on the essential contributors: the developers. Our 9th annual ...
NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

| | FEATURED, ICS, OT
“Is our critical infrastructure truly secure in the face of ever-evolving cyber risks and insider threats?” This question resonates with an urgency that cannot be disregarded in a world where technology is ...
Behind The Breach: Social Engineering of Helpdesk Agents

Behind The Breach: Social Engineering of Helpdesk Agents

| | FEATURED, Security Guidance
The Obsidian Threat Research team has determined an uptick in SaaS compromises where the initial access vector is social engineering of a helpdesk agent. Fortunately, threat actors tend to follow a predictable ...
OT Attack Path Analysis: A Comprehensive Guide

OT Attack Path Analysis: A Comprehensive Guide

| | FEATURED, ICS, OT, Threat Intelligence
The convergence of Information technology (IT) and Operational technology (OT) networks, resulting in the exposure of OT networks to threats, paved the way for OT cybersecurity. OT is the use of hardware ...
Fundamentals of attack path analysis in an OT environment

Fundamentals of attack path analysis in an OT environment

| | FEATURED, ICS, OT, Threat Intelligence
At its core, an attack path analysis presents a powerful visual and impactful representation covering a potential path that cyber threat actors or malicious payloads may tread to breach asset or network ...