Cybersecurity & SCADA Systems – Why It Matters

SCADA Systems Illustration

SCADA systems are the heart of most modern industrial facilities. We’re going to discuss what SCADA is and why cybersecurity for this important system matters. WHAT EXACTLY IS SCADA? SCADA systems are the supervisory-level control point over machinery and processes across the entire facility. It is a subset of ICS that combines hardware and software […]

5 Common Cybersecurity Threats You Should Be Aware Of

Common Cyber Threats

In today’s digital world, there are countless cybersecurity threats hiding in plain sight. Many of them are more common than you may think. This blog will discuss a few of these trending threats and our recommended prevention methods. 1. Ransomware Ransomware is a form of malware that blocks a company’s access to its devices and […]

OT/IT Convergence: Combining systems for business growth

IT OT Convergence

With industry 4.0 in full swing, OT and IT are rapidly becoming one and the same. OT/IT convergence is driving a major digital transformation within this growing industry. What is OT/IT Convergence? Operational technology (OT) and Information technology (IT) are often used synonymously, but the two play different key roles within any industrial organization. IT […]

Colonial Pipeline Hack: What We Know So Far

Colonial Pipeline Hack: What We Know So Far

Colonial Pipeline Hack: A Ransomware Attack On May 7th, Colonial Pipeline announced that it has been the victim of a serious cyberattack. The issue forced the company to shut down its entire network, leading to major disruptions in its operations. By attempting to isolate and contain the threat, Colonial Pipeline was also forced to put […]

Ransomware attack halts Sierra Wireless Production Activities

Ransomware Attack Halts Sierra Wireless Production Activities One of the leading solutions providers of internet-of-things (IoT), Sierra Wireless, experienced a ransomware attack some weeks ago that halted its production activity, also freezing other internal operations. Routers, gateways, modules, smart connectivity solutions for IoT devices and cellular modems are some of the communication equipment made by […]

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Shell, the multinational oil giant, disclosed in late March that the personal information of some of its stakeholders and business data from linked organizations have been compromised after a successful attack on its network.  It was disclosed by the company that a still-unknown malicious agent breached into the system, accessing files containing sensitive data belonging […]

Reactions to U.S. Water Plant Hack

In the second week of February 2021, the U.S. government revealed that unknown hackers had gained remote access to systems at a water plant in Florida City. The hackers attempted to raise the levels of certain chemicals to an extent where members of the public would run the risk of being poisoned. The water supply […]

Japan’s Industries Targeted by Hackers Employing Backdoors

APT10, also known as Stone Panda, Cicada, POTASSIUM, and Red Apollo, was found to be behind a series of cyberattacks targeting industry sectors in Japan as part of a large, long-running campaign against the Asian country.

APT10, also known as Stone Panda, Cicada, POTASSIUM, and Red Apollo, was found to be behind a series of cyberattacks targeting industry sectors in Japan as part of a large, long-running campaign against the Asian country. By using novel malware, APT10 attacked companies deploying malicious backdoors in a sophisticated fashion. With these backdoors, the group […]

Homeland Security Bets On Upgraded Cybersecurity Protection for the Nation

Homeland Security Bets On Upgraded Cybersecurity Protection for the Nation

In the last few years, the United States has been the victim of serious cybersecurity threats that weren’t managed adequately. With time, the rivalry between the US and its international contenders, such as China, Russia, Iran, and North Korea, has shaped a new kind of battleground, one that focuses on disrupting digital information and technology. […]