Featured

My reflections from GISEC 2023 (1)

My reflections from GISEC 2023 and the cybersecurity challenges we are faced with in the Middle East region.

According to a new report from analyst firm Frost and Sullivan, the Middle East’s cybersecurity market is expected to reach $31 billion by the year 2030, up from $7.5 billion in 2022. This exponential growth is a clear reflection of the state of the market and the level of priority that enterprises are giving to […]

My reflections from GISEC 2023 and the cybersecurity challenges we are faced with in the Middle East region. Read More »

The cybersecurity link to the Chinese spy balloons

The cybersecurity link to the Chinese spy balloon episode

In the last eight days, US fighter jets have eliminated 4 Chinese spy balloons. The fourth one was shot along the border of Alaska and Canada last Saturday.  The US Defense Department has attributed the increase in the detection – and shoot-downs – of suspicious flying objects to increased scrutiny of U.S. airspace and the

The cybersecurity link to the Chinese spy balloon episode Read More »

APT41’s expanding capabilities pose a significant economic threat

APT 41’s expanding capabilities pose a significant economic threat

Chinese hacker group APT 41 has been in the news for multiple instances of cyberattacks, espionage, cyber piracy, and cybercrimes for at least a decade now. In 2022, however, APT 41’s activities have expanded significantly to net more data and geo-political leverage for its backers. This trend does have implications for governments and institutions of

APT 41’s expanding capabilities pose a significant economic threat Read More »

Threats to air force assets too real to ignore

Threats to air force assets too real to ignore

Imagine a scenario where hackers take control of ground-based command and control systems and connected networks to either shut down a critical system or manipulate feeds leading to wrong decisions being taken on the battlefield. Communication systems, guidance systems, and situational awareness management systems could be targeted with intrusion or extended scans to exfiltrate data.

Threats to air force assets too real to ignore Read More »

Supply chain cybersecurity tips from NSA and CISA

Supply chain cybersecurity tips from NSA and CISA are timely and critical

Supply chains have become a preferential target for hackers. Government reports from the UK, USA and many other parts of the world confirm the growing attacks on supply chains impacting businesses and even government agencies. Such attacks often involve secondary or even tertiary targets that are attacked through a series of breaches across organizations connected through

Supply chain cybersecurity tips from NSA and CISA are timely and critical Read More »

China assigns APT actors to initiate revenge attacks

China assigns APT actors to initiate revenge attacks for the Shanghai police data leak

As per a series of conversations intercepted by Sectrio’s threat research team from various forums, China is learned to have identified Beijing-based APT 41 and Haikou, Hainan-based APT 40 as nodal cyber offense teams to initiate revenge attacks against many countries. Through these attacks, China may try to gain control over the narrative that has

China assigns APT actors to initiate revenge attacks for the Shanghai police data leak Read More »

Improving OT security by understanding key security challenges

Improving OT security by understanding key security challenges

The convergence of IT-OT and IoT has opened new avenues for hackers to target systems based on those three technologies. OT however, has been impacted uniquely as the security dimensions of OT have not been fully understood by security practitioners. With the collapse of the traditional air-gapped systems, OT devices are now being targeted extensively

Improving OT security by understanding key security challenges Read More »

Scroll to Top