ICS/OT Cybersecurity 2022 TXOne Annual Report Insights
This article gives an in-depth overview of TXOne’s insight report on ICS/OT cyber incidents. Read More HERE…
This article gives an in-depth overview of TXOne’s insight report on ICS/OT cyber incidents. Read More HERE…
We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022. Read More HERE…
Cloud migration is a journey, not a destination. Learn the basics of security for making the (gradual) switch, so you can get the most out of what the cloud has to offer. Read More HERE…
Discover the best practices for cybersecurity that developers can implement when working remotely. These will secure your system against security breaches and threats like malware, phishing, data theft, ransomware, and spyware. Read More HERE…
Greg Young, VP of Cybersecurity and CorpDev, discusses what the second-largest bank collapse in U.S. history means for cybersecurity. Read More HERE…
We present a case study of the cyberespionage efforts by Earth Preta. This study on an active campaign delves into the structure, goals, and requirements of the organizations involved, and provides an opportunity to conduct wider intelligence analysis and insights in the development of effective countermeasures. Read More HERE…
Contestants gather at Pwn2Own Vancouver to showcase their skills and uncover vulnerabilities Read More HERE…
After months of investigation, we found that several undisclosed malware and interesting tools used for exfiltration purposes were being used by Earth Preta. We also observed that the threat actors were actively changing their tools, tactics, and procedures (TTPs) to bypass security solutions. In this blog entry, we will introduce and analyze the other tools and malware used by the threat actor. Read More HERE…
Misconfigured cloud and IT assets open the door to a wide range of cyber risks. Automated, continuous cybersecurity monitoring lets organizations watch accounts and systems for exposures in real time and maintain strong attack surface risk management. Read More HERE…