Blog

Blog

Cybersecurity Framework – Protect – part 1

Cybersecurity Framework in OT The NIST Cybersecurity Framework (CSF) has been widely adopted by various organizations in both the public and private sectors. It serves as a guide for conducting cybersecurity activities and addressing cybersecurity risks. This...
KOSTOVITE, KAMACITE & XENOTIME – 2022 update

KOSTOVITE, KAMACITE & XENOTIME – 2022 update

Alongside the CHERNOVITE and BENTONITE new threat groups which emerged in 2022, there have been several other Active Threat players which have emerged in recent years. In its Year in Review Report 2022, Dragos gives an update on the most noticeable of them:...

read more
CHERNOVITE and BENTONITE – New Threats of 2022

CHERNOVITE and BENTONITE – New Threats of 2022

Only some two weeks ago, towards the end of February 2023, Dragos released its 6th year running ‘ICS/OT Cybersecurity year in review’. Today we will look at the two new threat groups Dragos discovered in 2022. 1. CHERNOVITE First reported on in May 2022...

read more
Asset visibility for defendable OT

Asset visibility for defendable OT

Asset visibility is a critical component of a strong OT cybersecurity strategy. It is the process of identifying and tracking all assets within an OT environment, including industrial control systems (ICS), endpoints, and network devices. There are several...

read more
How to effectively utilise MITRE ATT&CK for ICS

How to effectively utilise MITRE ATT&CK for ICS

MITRE ATT&CK is a knowledge base of cyber attacker TTPs that catalogs behaviours, providing a visual representation of attack patterns that can help detect and respond effectively to attacks. However, it was initially designed for enterprise IT, so MITRE...

read more
MITRE ATT&CK for ICS – a tool for challenging times

MITRE ATT&CK for ICS – a tool for challenging times

As critical infrastructure around the world faces a growing number of potential industrial threats that could potentially disrupt an organization's operational technology (OT) infrastructure or assets, the task of building a robust cyber defense is becoming...

read more
Cloud Computing – 2022 Top Threats – part 6

Cloud Computing – 2022 Top Threats – part 6

Cloud Storage Data Exfiltration The exfiltration of data from cloud storage refers to the unauthorized access, viewing, theft, or usage of sensitive, confidential, or protected information by someone outside of the organization's control. This can be the...

read more

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.