• Blog
  • Case Studies
  • Use Cases
  • Knowledge Hub
    • Threat Landscape Reports
    • Malware Reports
    • News
    • Weekly Threat Reports
    • Protocol Research
    • Infographics
    • Glossary
    • Videos
    • Frequently Asked Questions
  • Request a demo
Sectrio
  • Solutions
    • By Industry
        • Manufacturing
        • Oil and Gas
        • Smart Cities
        • Enterprise
        • Defense
        • Maritime
        • Telecom
        • Utilities
        • Healthcare
    • By Compliance
      • NERC CIP
      • IEC 62443
  • Products
    • Technology
      • Sectrio Hub
      • Sectrio Edgetech
      • Decoy and Deception
    • Platforms
      • 5G Security Suite
      • Threat Intelligence
      • IoT-OT-IT Converged Security Suite
    • Modules
      • Vulnerability Management
      • Threat Management
      • Micro Segmentation
  • Services & Support
    • Managed Services
      • Incident Management
      • Asset Management
    • Consulting Services
      • Security for Digital Transformation
  • Resources
    • Product
      • Product Briefs
      • Whitepapers
      • Ebooks
    • Success Stories
      • Case Studies
      • Compliance Kits
    • Sectrio Webinars
      • Upcoming Webinars
      • On Demand Webinars
  • Partners
    • Strategic Partnerships
  • Company
    • About us
      • Careers
      • Contact Us
    • News and Events
      • Media Coverage
      • Events
Select Page
China assigns APT actors to initiate revenge attacks for the Shanghai police data leak

China assigns APT actors to initiate revenge attacks for the Shanghai police data leak

by Prayukth K V | Jul 11, 2022 | Cyber Security, Featured

As per a series of conversations intercepted by Sectrio’s threat research team from various forums, China is learned to have identified Beijing-based APT 41 and Haikou, Hainan-based APT 40 as nodal cyber offense teams to initiate revenge attacks against many...
Critical infrastructure faces a new kind of cybersecurity challenge

Critical infrastructure faces a new kind of cybersecurity challenge

by Prayukth K V | Feb 7, 2022 | Cyber Security, Featured, OT

Yes, the time to act was yesterday, but is it too late to ramp up your cybersecurity posture now? Can investments in multi-level cybersecurity interventions at this point, save us from more cyberattacks in the future? While post-facto investments cannot secure data...
Rising ransomware attacks point to a larger cybersecurity problem

Rising ransomware attacks point to a larger cybersecurity problem

by Prayukth K V | Feb 4, 2022 | Cyber Security, Featured, OT

In January 2022, we witnessed a huge rise in ransomware attacks specifically on IoT and IT networks. Most of these attacks were designed to lock up the data, copy parts or whole of it and then dump the data on the Dark Web. If media reports are to be believed, many...
Improving OT security by understanding key security challenges

Improving OT security by understanding key security challenges

by Prayukth K V | Feb 3, 2022 | Cyber Security, Featured, OT

The convergence of IT-OT and IoT has opened new avenues for hackers to target systems based on those three technologies. OT however, has been impacted uniquely as the security dimensions of OT have not been fully understood by security practitioners. With the collapse...
10 easy to deploy steps for better Industrial Control Systems (ICS) security  

10 easy to deploy steps for better Industrial Control Systems (ICS) security  

by Prayukth K V | Jan 31, 2022 | Cyber Security, Featured, Manufacturing, OT

Last week the Biden Administration announced the extension of the Industrial Control Systems (ICS) Cybersecurity Initiative to the water and wastewater treatment facilities. ICS across sectors is at risk from targeted cyberattacks. This is especially true of ICS...
NIST revises security and privacy control assessment methods

NIST revises security and privacy control assessment methods

by Prayukth K V | Jan 28, 2022 | Compliance, Cyber Security, Featured

The NIST (National Institute of Standards and Technology) has announced the release of a new Special Publication revision to verify the veracity of the implementation of security and privacy controls. Special Publication (SP) 800-53A Revision 5 includes updates that...
« Older Entries
Next Entries »

Get the report!

GTLAA2023-SQR

Recent Posts

  • OT Attack Path Analysis: A Comprehensive Guide
  • Fundamentals of attack path analysis in an OT environment
  • Deconstructing the CL0P RaaS group and understanding the MOVEit breach in 2023
  • A Complete Guide to OT/ICS Vulnerability Management
  • An integrated OT SOC: Cost or Investment?
Workplace Westminster London Dubai Mumbai Bangalore Singapore

1499 W. 120th Ave, Ste 210 Westminster, CO 80234
Tel: +1 303 301 6200
Fax: +1 303 301 6201

1st Floor, Rama Apartment,17 St Ann’s Road, Harrow, Middlesex, HA1 1JU
Tel : +44 0207 8265300
Fax : +44 0207 8265352

#Office number 722, Building number 6WA, Dubai Airport Free Zone Authority(DAFZA), P.O. Box: Box 54834,Dubai United Arab Emirates
Tel : +9 714 214 6700
Fax : +9 714 214 6714

Level 13, R-Tech Park, Nirlon Knowledge Park, Off Western Express Highway, Goregaon (E) – Mumbai 400063
Tel : +91 22 4476 4567

Pritech Park, SEZ Block -09, 4th Floor B Wing Survey No. 51 to 64/4 Outer Ring Road, Bellandur Village Varthur, Hobli, Bengaluru, Karnataka 560103, India
Tel : +91 80 6659 8700
Fax : +91 80 6696 3333

175A Bencoolen Street #08-03 Burlington Square Singapore 189650
Tel : +65 6338 1218
Fax: +65 6338 1216

  • Follow
  • Follow
  • Follow
  • Follow

Solutions

By Industry

By Compliance

Products

Sectrio Hub
Sectrio Edgetech
Vulnerability Management
Threat Management

Micro Segmentation
5G Security Suite
Threat Intelligence

Services & Support

Asset Management
Incident Management
Consulting Services
Security for digital transformation

Quick Links

Company
Partners
Careers
Contact
Blog
Case Studies
Media Coverage
Whitepapers
Spanish-Site Index

© Copyright SECTRIO 2023. All Rights Reserved. Privacy Policy