Sectrio

Author name: vikas.karunakaran

Vikas Karunakaran
Increasingly visible nation-state actor footprint forces APT groups to increase stealth (1)

Increasingly visible nation-state actor footprint forces APT groups to increase stealth

2022 is turning out to be the year of nation-state actors. With attacks on wind turbine operations and public transit services in the Netherlands, utility firms in India, retail businesses in Taiwan, and stock markets in the US being traced to APT groups, this year has logged more APT activity than ever before. With the […]

Increasingly visible nation-state actor footprint forces APT groups to increase stealth Read More »

Cyber surveillance grids double up as cyberattack facilitation infrastructure

Cyber surveillance grids double up as cyberattack facilitation infrastructure

Large-scale domestic and international surveillance and activity-tracking grid operated by a large South East Asian country are also enabling its APT teams to strike deep into the digital territories of other countries. This country has invested extensively in promoting cost-effective surveillance technologies around the world using its diplomatic levers and economic dominance. Also Read: Complete Guide

Cyber surveillance grids double up as cyberattack facilitation infrastructure Read More »

Cybersecurity considerations and recommendations for securing distributed energy resources on power grids

Cybersecurity considerations and recommendations for securing distributed energy resources on power grids

A recent report prepared by the U.S. Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response and the Office of Energy Efficiency and Renewable Energy highlights the cybersecurity considerations to be taken into account for distributed energy resources (DER), such as solar, storage, and other clean energy technologies. The report also outlines the

Cybersecurity considerations and recommendations for securing distributed energy resources on power grids Read More »

takeaways from the latest OTICS advisory from NSA and CISA (2)

10 takeaways from the latest OT/ICS advisory from NSA and CISA

The latest joint advisory from NSA and CISA adds to the previous joint guidance released by the two agencies in order to stop malicious ICS activity and reduce OT exposure. Also Read: Complete guide to SCADA security The latest advisory describes the various TTPs that bad actors could use to compromise critical OT assets. It also deep dives into

10 takeaways from the latest OT/ICS advisory from NSA and CISA Read More »

Threats to air force assets too real to ignore

Threats to air force assets too real to ignore

Imagine a scenario where hackers take control of ground-based command and control systems and connected networks to either shut down a critical system or manipulate feeds leading to wrong decisions being taken on the battlefield. Communication systems, guidance systems, and situational awareness management systems could be targeted with intrusion or extended scans to exfiltrate data.

Threats to air force assets too real to ignore Read More »

Supply chain cybersecurity tips from NSA and CISA

Supply chain cybersecurity tips from NSA and CISA are timely and critical

Supply chains have become a preferential target for hackers. Government reports from the UK, USA and many other parts of the world confirm the growing attacks on supply chains impacting businesses and even government agencies. Such attacks often involve secondary or even tertiary targets that are attacked through a series of breaches across organizations connected through

Supply chain cybersecurity tips from NSA and CISA are timely and critical Read More »

Educational institutions and students on hacker’s radar

Educational institutions and students on hacker’s radar

Over the last two months, hackers have stepped up attacks on academic institutions and students thereby opening a new frontier in the battle against cybercrime. Rising attacks on educational institutions could have multiple security and risk implications for the overall security of everything connected and beyond. Implications of attacks on educational institutions: Major security incidents

Educational institutions and students on hacker’s radar Read More »

_Digital Transformation - Addressing cybersecurity challenges

Close your Digital Transformation cybersecurity gaps now

In the first two quarters of 2022, the attacks on digital transformation projects have grown manifold in the Middle East. Threat actors are targeting production systems, assembly lines, safety and instrumentation systems (including legacy systems dating back to 2017 or earlier), IoT devices, and IoT and OT networks. A new set of actors is relentlessly

Close your Digital Transformation cybersecurity gaps now Read More »

How to secure a Smart Factory

How to secure a smart factory?

Securing smart factories is a relatively new priority for many manufacturers. Which is why many manufacturers often struggle with basic cybersecurity requirements while addressing larger security goals. The problem is compounded by lack of skills, policies, and employee sensitization in some instances. For smart factory projects to be successful, the outcomes need to be secured

How to secure a smart factory? Read More »

Scroll to Top