According to a report, 71% of energy industry professionals consider their organizations more vulnerable to OT cyber events than ever. These are private organizations, but the stakes are much higher for government-owned systems. Government-owned energy systems such as national grids,…
Tag: Blog RSS Feed
The Rising Tide: Understanding the Surge in Cyber Attacks in India
Over the past year, India witnessed a steep rise in cyberattacks. While news focused on big-ticket data breaches and mainstream ransomware attacks, it ignored how the overall threat landscape has become more sophisticated and ingrained. India detected over 369 million…
The Evolution of Phishing Attacks: Why Traditional Detection Methods Are Failing
If they weren’t so harmful to both businesses and consumers, the sophistication of modern phishing would be quite impressive. Today’s most invasive cybercriminals have moved beyond the old strategies of generic mass-email scams. They’re now leveraging advanced technologies like Artificial…
Is Continuous Deployment Too Risky? Security Concerns and Mitigations
Adopting Continuous Deployment, an extreme form of software delivery automation, can drastically speed up software delivery, but it also introduces critical security challenges. Some of the most severe, global-scale security breaches of recent years (Solarwinds and Kaseya are just two…
Interlock ransomware: what you need to know
What is the Interlock ransomware? Interlock is a relatively new strain of ransomware, that first emerged in late 2024. Unlike many other ransomware families it not only targets Windows PCs, but also systems running FreeBSD. If you are impacted, you…
NIST’s Responsibilities Under the January 2025 Executive Order
While NIST frameworks are typically not mandatory for most organizations, they are still being called on to do some heavy lifting to bolster the nation’s cybersecurity defenses. Under the January 2025 Executive Order (EO) on Strengthening and Promoting Innovation in…
Proposed HIPAA Update Makes Yearly Pen Testing Mandatory
In January of this year, significant changes to the HIPAA Security Rule were proposed by the Office of Civil Rights for the Department of Health and Human Services (OCR). The proposed update to the HIPAA Security Rule, published on January…
The Unique Cybersecurity Risks in the Manufacturing Sector
For the fourth year running, in 2025, the IBM X-Force Threat Intelligence Index crowned the manufacturing sector as the number one targeted industry for cybercrime, representing 26% of incidents. The problem is so bad that manufacturing has even managed to…
What the UK’s New Cyber Resilience Bill Means for Businesses—and How to Stay Ahead
The UK is facing the same evolving digital challenges as the rest of the world, and its new Cyber Security and Resilience Bill is designed to not only help it catch up – but stay ahead. Attackers change their tactics…
3AM Ransomware Attackers Pose as IT Support to Compromise Networks
Cybercriminals are getting smarter. Not by developing new types of malware or exploiting zero-day vulnerabilities, but by simply pretending to be helpful IT support desk workers. Attackers affiliated with the 3AM ransomware group have combined a variety of different techniques…