Blog
Blog
‘Denonia’ – the first cryptominer built for AWS Lambda
On the 6th April, CADO Security reported on its finding of the first known case of a cryptominer malware designed specifically to run in the AWS Lambda environment. The malware is written in Go and CADO believes it contains a customised variant of the XMRig...
New malicious tools targeting ICS / SCADA systems and mitigations
ICS / SCADA systems under a new threat Yesterday, on the 13th April, CISA, DOE and FBI released a joint Cybersecurity Advisory - Alert (AA22-103A) - warning that certain APT actors have proven to be able to gain full access to multiple Industrial Control...
Shared Responsibility for Security in the Public Cloud
In general, cloud infrastructure can be broadly divided into two main layers. Firstly, there all are the hardware resources – the storage systems, servers, switches, routers, firewalls, etc – which are the underlying, the ‘invisible’, part of any cloud...
Industrial Control Systems Best Practices
Along with the US Department of Justice naming four Russian spies in late March this year and accusing them of hacking activities spanning nearly a decade impacting critical infrastructure across the globe, CISA has issued a joint Cybersecurity Advisory...
Best Authentication Practices
Authentication - one of the basic actions we perform day in, day out, often probably not giving much thought to it as it is so ‘basic’. And yet, as it often is in life, simple things can be amongst some of the most important blocks on which other elements of...
Industrial Network Security Architecture – Network Protection
Segmenting an industrial network into a cell layer, an aggregation layer, and a backbone layer is not enough from a cybersecurity perspective. Such a solution is missing the necessary functions of restriction of data exchange and the identification of...
FSB’s Global Energy Sector Intrusion Campaign 2011-2018
Last week, on Thursday, the 24th of March 2022 the US Justice Department officially charged four Russian officials accusing them of carrying out hundreds of cyberattacks targeting critical infrastructure facilities worldwide. The list of affected countries...
Industrial Network Security Architecture – Network Segmentation
The idea of network segmentation is an old concept in IT environments. It began as a way to improve network performance and bandwidth. Recently network segmentation is used proactively as a part of network security architecture. Segmenting the network into...
Industrial Network Security Architecture – Asset and Network Management
Quickly advancing digitalisation and rapid spread of the Industrial Internet of Things (IIoT) entails the growth in number of connected devices in industrial networks, which in return increases the surface for a potential cyberattack. This situation demands...
The Cloud and the Dark Web
The dark web has been the go-to place for shady deals for some years now. It comes then to no surprise that just as one can purchase credit card numbers or other type of data commodity, one can also acquire Cloud accounts access credentials. And the market...