Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
OT Security – Introduction – OT Overview

OT Security – Introduction – OT Overview

OT Overview Operational technology (OT) refers to a diverse range of programmable systems and devices that interact with the physical world, either directly or by managing devices that do. These systems and devices can detect or cause changes in devices,...

read more
The impact of IT threats on OT environment

The impact of IT threats on OT environment

In recent years, cyber threats have been on the rise, not only targeting information technology (IT) systems but also industrial control systems (ICS) and operational technology (OT). Particularly, there has been a surge in incidents impacting ICS/OT. The...

read more
‘Insecure-by-Design’ – Impact and Mitigation

‘Insecure-by-Design’ – Impact and Mitigation

In its 2022 OT:ICEFALL report Vedere Labs has detected a group of 56 security flaws that impact devices manufactured by some of the most recognisable operational technology (OT) vendors. These vulnerabilities have been classified into four primary...

read more
The Legacy of ‘Insecure-by-Design’

The Legacy of ‘Insecure-by-Design’

In June 2022 Vedere Labs published the ‘OT Icefall’ report disclosing 56 CVEs related to insecure-by-design functions affecting devices from 10 major OT manufacturers. The impact these vulnerabilities have is that they allow for a take-over, DoDs, or...

read more
ELECTRUM, ERYTHRITE & WASSONITE  – 2022 update

ELECTRUM, ERYTHRITE & WASSONITE – 2022 update

Continuing last week’s entry on the update on operations of the most noticeable Active Threat players from Dragos’ Year in Review Report 2022, today’s article is dedicated to ELECTRUM, ERYTHRITE, WASSONITE ELECTRUM ELECTRUM associated with SANDWORM APT is...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.