Cyber Security

Unmasking Black Basta Ransomware Group A Closer Look

Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group

The Black Basta threat actor is a sophisticated cyber threat group that has emerged in recent years, targeting various organizations across multiple industries. The primary objective of the Black Basta THREAT ACTOR is to gain unauthorized access to targeted networks and exfiltrate sensitive information for intelligence gathering or financial gain. The group is known to […]

Unmasking Black Basta: A Closer Look at the Notorious Ransomware Group Read More »

Understanding the significance of the latest “cyberattack” on AIIMS

Deciphering the latest attack on AIIMS    

In the latest edition of our threat landscape report, Sectrio’s threat researchers had done a comprehensive analysis of the Indian cyber threat landscape, the actors, tactics, malware, and enablers. This report also highlighted the alarming levels of sophistication and maturity demonstrated by state-backed hackers that are targeting Indian critical infrastructure, businesses, and financial services infrastructure.

Deciphering the latest attack on AIIMS     Read More »

Why OT security gap and threat assessment is essential for your security posture

Why OT security gap and threat assessment is essential for your security posture

An Operational Technology risk and threat assessment can serve as a foundational activity for improving your overall approach to infrastructure security. Not only can it identify gaps in your OT security posture, but it can also help sensitize employees and to ascertain if you have the right resources, practices, and workflows to improve OT security.

Why OT security gap and threat assessment is essential for your security posture Read More »

Securing-Legacy-OT-Systems-Challenges-and-Strategies

Securing Legacy OT Systems: Challenges and Strategies

Operational Technology (OT) systems are critical to the operation of industrial and critical infrastructure processes. These systems often consist of legacy equipment, hardware, and software that may be decades old and lack modern security features. As a result, legacy OT systems are vulnerable to cyberattacks that can disrupt operations, cause safety incidents, and result in

Securing Legacy OT Systems: Challenges and Strategies Read More »

Corporate espionage, the latent objective behind many cyberattacks

Corporate espionage, the latent objective behind many cyberattacks

Two instances of major cyberattacks segregated in space and time are linked by a hidden objective. One targets a large pharmaceutical company in Asia and the other a large American heavy equipment manufacturer. These two cyberattacks, as per our research have a not-so-obvious connection. While on the surface, both attacks seemed to be motivated by

Corporate espionage, the latent objective behind many cyberattacks Read More »

TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

On March 8th, 2023, the Transportation Security Administration (TSA) announced a new and important cybersecurity amendment to the security programs of certain TSA-regulated airports and aircraft operators in the US. This emergency action follows a similar set of measures announced in October 2022 for passenger and freight railroad carriers. The TSA is taking this action

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure Read More »

The cybersecurity link to the Chinese spy balloons

The cybersecurity link to the Chinese spy balloon episode

In the last eight days, US fighter jets have eliminated 4 Chinese spy balloons. The fourth one was shot along the border of Alaska and Canada last Saturday.  The US Defense Department has attributed the increase in the detection – and shoot-downs – of suspicious flying objects to increased scrutiny of U.S. airspace and the

The cybersecurity link to the Chinese spy balloon episode Read More »

Complete-Guide-to-Zero-Trust-Security

Complete Guide to Zero Trust Security

Zero Trust Security – Always Verify and Authenticate Zero Trust Security architecture functions on the premise that any connection requires mandatory identification, verification, and authentication. Previously, networks were potentially secure from outside threats. At the same time, those inside the system had complete access to every nook and corner of the network. The security systems

Complete Guide to Zero Trust Security Read More »

Specific IoT and OT security predictions for North America for 2023

Specific IoT and OT security predictions for North America for 2023

The year 2023 will see a significant shift in the way cyberattacks are engineered and that is just a start. To help you understand how things will change in 2023, we have distilled our learning from the last 4 years and the threat intelligence gathered from our global threat research facilities into specific points for

Specific IoT and OT security predictions for North America for 2023 Read More »

Scroll to Top