Life Loss as a Consequence of Cybercrime: What Do You Need to Know?

Life Loss as a Consequence of Cybercrime: What Do You Need to Know?

Ransomware is a powerful resource used by malicious agents to blackmail individuals and organizations for a ransom. And with bigger, more important victims, the criminals could get heftier rewards, right? The logic behind this statement makes sense. If a malicious party successfully attacks a powerful institution, in charge of sensitive or critical activities, the criminal […]

Ransomware Operations Target OT Software: What You Should Know?

Ransomware Operations Target OT Software: What You Should Know?

Operational technology (OT) is a highly attractive target for malicious agents. In charge of controlling and monitoring highly complex systems at industrial facilities, OT processes can make or break entire operations. The loss can easily be in the millions. That’s why there is always a race to develop powerful cybersecurity platforms such as Julie Security. […]

OT VPN Security: Serious Threats Demanding Your Attention

OT VPN Security: Serious Threats Demanding Your Attention

During 2020, major modern industrial VPN solutions have shown relevant vulnerabilities that may be exploited to illegally access OT networks and cause serious damage. Popular VPN solutions have been exposed by cybersecurity firms as liabilities. A virtual private network enables users to send and receive data across shared and public networks as if their devices […]

Working from Home: How to Make It Safe?

Working from Home: How to Make It Safe?

The idea of working from home, a methodology now imposed by the pandemic, is something most businesses should get comfortable with. For many years, there has been resistance against the model, ignoring the implications of its implementation. Now, after its sudden enforcement, something that no one could possibly predict in 2019, thousands of businesses around […]

Holdmayr International AG’s Data Leak Caused by CLOP Ransomware

Holdmayr International AG’s Data Leak Caused by CLOP Ransomware

During the past few weeks, Holdmayr International AG has been suffering the consequences of a dramatic case of ransomware. Holdmayr, which is a renewed logistics company from Austria, employs more than 2,000 workers and has an annual revenue of over 300 € million. These numbers may also represent the extraordinary volume of sensitive data that […]

How to Meet Tighter Cybersecurity Budgets with Consolidated Tools

In the past few months, something curious happened in the world of cybersecurity. As COVID-19 forced organizations to send their professionals to work remotely, greater needs in cybersecurity arose. But also, concurrently, these organizations found themselves short of cash, limited when investing in the improvement of their processes. With a remote workforce, new challenges in […]

SCADA/OT Events: Understanding and Acting

SCADA/OT Events: Understanding and Acting

When working with SCADA, understanding events is vital to prevent incidences and severe consequences for the facility. In most cases, it’s challenging to detect what is a harmless occurrence among dozens of events and what is a technical problem. Every single action we take within our system will be logged as an event. This leads […]

Avoiding Cybersecurity Risks at Water Treatment & Sewer Facilities

Avoiding Cybersecurity Risks at Water Treatment & Sewer Facilities

Water treatment and sewer facilities have become a frequent target for malicious parties and cyberattacks. This kind of facility has a crucial role in our societies’ infrastructure, so shocking their operations come with a high cost. Industrial Control Systems (ICS), since connected to the internet, are exposed to major threats that organizations, both public and […]