IoT

AI-powered cyberattacks are evolving at a frightening pace

AI-powered cyberattacks are evolving at a frightening pace

The recently released IoT and OT threat landscape assessment and analysis report from Sectrio has revealed many previously unknown aspects of AI’s use in conceptualizing and executing cyberattacks. This report presents a detailed view of the models and techniques that hackers use to deploy AI for improving targeting, conducting scans, and automating the modification of […]

AI-powered cyberattacks are evolving at a frightening pace Read More »

Sectrios-OT-and-IoT-threat-report-uncovers-the-Chinese-intelligence-conveyor-belt

Sectrio’s OT and IoT threat report uncovers the Chinese intelligence conveyor belt

Sectrio, the premier IoT and OT security company has launched the findings of its latest edition of its much-awaited OT and IoT threat environment landscape analysis report 2023. The latest report covers over 80,000 data points from global cyber and threat hotspots, dark web forums, messaging platforms, and online hacker congregation and collaboration forums. The

Sectrio’s OT and IoT threat report uncovers the Chinese intelligence conveyor belt Read More »

Corporate espionage, the latent objective behind many cyberattacks

Corporate espionage, the latent objective behind many cyberattacks

Two instances of major cyberattacks segregated in space and time are linked by a hidden objective. One targets a large pharmaceutical company in Asia and the other a large American heavy equipment manufacturer. These two cyberattacks, as per our research have a not-so-obvious connection. While on the surface, both attacks seemed to be motivated by

Corporate espionage, the latent objective behind many cyberattacks Read More »

TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure

On March 8th, 2023, the Transportation Security Administration (TSA) announced a new and important cybersecurity amendment to the security programs of certain TSA-regulated airports and aircraft operators in the US. This emergency action follows a similar set of measures announced in October 2022 for passenger and freight railroad carriers. The TSA is taking this action

Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure Read More »

The cybersecurity link to the Chinese spy balloons

The cybersecurity link to the Chinese spy balloon episode

In the last eight days, US fighter jets have eliminated 4 Chinese spy balloons. The fourth one was shot along the border of Alaska and Canada last Saturday.  The US Defense Department has attributed the increase in the detection – and shoot-downs – of suspicious flying objects to increased scrutiny of U.S. airspace and the

The cybersecurity link to the Chinese spy balloon episode Read More »

Complete-Guide-to-Zero-Trust-Security

Complete Guide to Zero Trust Security

Zero Trust Security – Always Verify and Authenticate Zero Trust Security architecture functions on the premise that any connection requires mandatory identification, verification, and authentication. Previously, networks were potentially secure from outside threats. At the same time, those inside the system had complete access to every nook and corner of the network. The security systems

Complete Guide to Zero Trust Security Read More »

Specific IoT and OT security predictions for North America for 2023

Specific IoT and OT security predictions for North America for 2023

The year 2023 will see a significant shift in the way cyberattacks are engineered and that is just a start. To help you understand how things will change in 2023, we have distilled our learning from the last 4 years and the threat intelligence gathered from our global threat research facilities into specific points for

Specific IoT and OT security predictions for North America for 2023 Read More »

_Digital Transformation - Addressing cybersecurity challenges

Close your Digital Transformation cybersecurity gaps now

In the first two quarters of 2022, the attacks on digital transformation projects have grown manifold in the Middle East. Threat actors are targeting production systems, assembly lines, safety and instrumentation systems (including legacy systems dating back to 2017 or earlier), IoT devices, and IoT and OT networks. A new set of actors is relentlessly

Close your Digital Transformation cybersecurity gaps now Read More »

Scroll to Top