Blog
Blog
Karakurt Data Extortion Group
Just over three months ago, on June 1st, the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN) jointly issued a Cybersecurity Advisory on the Karakurt Team...
The State of Global Operational Technology 2022 – part 2
SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...
Paving the way for Post-Quantum Cryptography
Two months ago, in early July, the US National Institute of Science and Technology (NIST) announced that the results of a six-year competition amongst the set of post-quantum algorithms had resulted in the selection of four initial algorithms (with the view...
The State of Global Operational Technology 2022 – part 1
SCADAfence, the OT & IoT cybersecurity technology consultancy, conducted a survey on the current state of OT security, the negative consequence of the shortage of qualified workforce in the field, and the general level of risk organisations are currently...
Chinese Campaign exploits Network Providers and Devices Worldwide
Nearly two months ago, on the 7th of June, CISA published Alert (AA22-158A). This alert describes the ways in which Chinese state-sponsored cyber actors exploit known vulnerabilities to establish an extensive network of compromised worldwide infrastructure....
Cybersecurity of Smart Buildings
When the topic of cybersecurity in Smart Buildings comes up, the question arises about the challenges related to the trend and technology, and who should be concerned about the topic. Building owners, investors, building managers, tenants, as well as...
Phishing Attacks & Mitigation – part 2
According to the CISCO’s 2021 Cybersecurity threat trends report, phishing accounts for around 90% of data breaches with at least one person having clicked a phishing link in around 86% of organisations. How to protect yourself from falling prey to a (spear)...
Phishing Attacks & Mitigation – part 1
As more and more of our everyday professional (and personal) lives take place online, so do increase the nefarious activities of those actors who want to abuse this fact and profit by extracting privileged information or influence us into taking an action...
Smart Meters in the context of Smart Grid and AMI architecture. Security, Vulnerability and Best Practice – Part 4
The power grid, one of the most crucial pieces of critical infrastructure, is on top of the list of interest to various APTs (Advanced Persistent Threat – stealthy threat actor, typically nation or state-sponsored) and other threat actors. Hence the security...
Smart Meters in the context of Smart Grid and AMI architecture. Security, Vulnerability and Best Practice – Part 3
The power grid, which is one of the most crucial pieces of critical infrastructure, is on top of the list of interest to various APTs (Advanced Persistent Threat – stealthy threat actor, typically nation or state-sponsored) and other threat actors. Hence the...