Blog
Blog
OT Security – Introduction – OT Overview
OT Overview Operational technology (OT) refers to a diverse range of programmable systems and devices that interact with the physical world, either directly or by managing devices that do. These systems and devices can detect or cause changes in devices,...
ENISA’s Threat Landscape Report 2022 – Part 9 – Disinformation & Misinformation
In contemporary times, digital platforms have become the primary source of news and media. Social media platforms, news outlets, and search engines are now major sources of information for a significant number of people. However, these sites operate by...
The impact of IT threats on OT environment
In recent years, cyber threats have been on the rise, not only targeting information technology (IT) systems but also industrial control systems (ICS) and operational technology (OT). Particularly, there has been a surge in incidents impacting ICS/OT. The...
ENISA’s Threat Landscape Report 2022 – Part 8 – Impact of Russian war
The impact of Internet usage and the unrestricted dissemination of information is being felt by every individual in Europe. The internet has become an essential requirement for a significant number of people, enabling them to work, study, express their...
‘Insecure-by-Design’ – Impact and Mitigation
In its 2022 OT:ICEFALL report Vedere Labs has detected a group of 56 security flaws that impact devices manufactured by some of the most recognisable operational technology (OT) vendors. These vulnerabilities have been classified into four primary...
ENISA’s Threat Landscape Report 2022 – Part 7 – DDoS attacks
One of the most significant threats to IT systems is Distributed Denial of Service (DDoS), which aims to compromise system availability by depleting resources, resulting in decreased performance, data loss, and service outages. In recent times, DDoS attacks...
The Legacy of ‘Insecure-by-Design’
In June 2022 Vedere Labs published the ‘OT Icefall’ report disclosing 56 CVEs related to insecure-by-design functions affecting devices from 10 major OT manufacturers. The impact these vulnerabilities have is that they allow for a take-over, DoDs, or...
ENISA’s Threat Landscape Report 2022 – Part 6 – Threats Against Data
The importance of data as the driving force behind a data-driven economy has made it a primary target for cybercriminals. These criminals employ a range of threats aimed at data sources, including unauthorized access, disclosure, and manipulation. Such...
ELECTRUM, ERYTHRITE & WASSONITE – 2022 update
Continuing last week’s entry on the update on operations of the most noticeable Active Threat players from Dragos’ Year in Review Report 2022, today’s article is dedicated to ELECTRUM, ERYTHRITE, WASSONITE ELECTRUM ELECTRUM associated with SANDWORM APT is...
ENISA’s Threat Landscape Report 2022 – Part 5 – Social Engineering
Social engineering encompasses a wide range of activities that aim to exploit human errors or behaviour, with the ultimate goal of accessing information or services. It employs various forms of manipulation to deceive victims into either making errors or...