ICS
OT/ICS Vulnerability Assessment and Penetration Testing (VAPT) – A Complete Guide
Have you ever wondered about the hidden chinks in the armor of your operational technology systems? In the interconnected web of technology, where the digital landscape extends its reach into every corner ...
NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals
“Is our critical infrastructure truly secure in the face of ever-evolving cyber risks and insider threats?” This question resonates with an urgency that cannot be disregarded in a world where technology is ...
OT Attack Path Analysis: A Comprehensive Guide
The convergence of Information technology (IT) and Operational technology (OT) networks, resulting in the exposure of OT networks to threats, paved the way for OT cybersecurity. OT is the use of hardware ...
Fundamentals of attack path analysis in an OT environment
At its core, an attack path analysis presents a powerful visual and impactful representation covering a potential path that cyber threat actors or malicious payloads may tread to breach asset or network ...
Deconstructing the CL0P RaaS group and understanding the MOVEit breach in 2023
The large-scale incorporation of connected OT/SCADA systems is a growing trend but are you aware of the increasing presence of sophisticated threat actors and rapidly budding ransomware variants? The question you should ...
A Complete Guide to OT/ICS Vulnerability Management
Are Your Operational Technologies Truly Secure? In the present landscape of digital interconnections, where operational technology (OT) serves as the lifeblood of industries, ensuring the robust security of these systems emerges as ...
An integrated OT SOC: Cost or Investment?
A dedicated OT Security Operations Center offers a strong foundation for launching and supporting many institutional security measures such as continuous threat detection, unified view and visibility, and OT governance and policy ...
‘Sabotage the Factory’ — 16 Big Bugs in Codesys ICS/OT/SCADA Software
CoDe16 FAIL: Researchers unveil high-severity vulns in Codesys Control, used in millions of devices ...
A Complete Guide to ICS Security Assessment
Did you know that the average cost of data breaches worldwide was $4.35 million in 2022, with phishing being the most common form of attack? Demand for ransom, locking critical data files, ...
QILIN Ransomware Report
QILIN also known as “Agenda” is a Ransomware Group that also provides Ransomware as a service (Raas). Qilin’s ransomware-as-a-service (RaaS) scheme earns anywhere between 80% to 85% of each ransom payment, according ...