• Blog
  • Case Studies
  • Use Cases
  • Knowledge Hub
    • Threat Landscape Reports
    • Malware Reports
    • News
    • Weekly Threat Reports
    • Protocol Research
    • Infographics
    • Glossary
    • Videos
    • Frequently Asked Questions
  • Request a demo
Sectrio
  • Solutions
    • By Industry
        • Manufacturing
        • Oil and Gas
        • Smart Cities
        • Enterprise
        • Defense
        • Maritime
        • Telecom
        • Utilities
        • Healthcare
    • By Compliance
      • NERC CIP
      • IEC 62443
  • Products
    • Technology
      • Sectrio Hub
      • Sectrio Edgetech
      • Decoy and Deception
    • Platforms
      • 5G Security Suite
      • Threat Intelligence
      • IoT-OT-IT Converged Security Suite
    • Modules
      • Vulnerability Management
      • Threat Management
      • Micro Segmentation
  • Services & Support
    • Managed Services
      • Incident Management
      • Asset Management
    • Consulting Services
      • Security for Digital Transformation
  • Resources
    • Product
      • Product Briefs
      • Whitepapers
      • Ebooks
    • Success Stories
      • Case Studies
      • Compliance Kits
    • Sectrio Webinars
      • Upcoming Webinars
      • On Demand Webinars
  • Partners
    • Strategic Partnerships
  • Company
    • About us
      • Careers
      • Contact Us
    • News and Events
      • Media Coverage
      • Events
Select Page
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS) 

Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS) 

by Sectrio | Dec 6, 2022 | Cyber Security, Healthcare, Threat Intelligence

The news of the All India Institute of Medical Sciences (AIIMS) servers being breached is making headlines across India. While the full extent of the data that was compromised and the actors who are behind it are still unknown, we do have some clues on what this...
Increasingly visible nation-state actor footprint forces APT groups to increase stealth

Increasingly visible nation-state actor footprint forces APT groups to increase stealth

by vikas.karunakaran | Nov 14, 2022 | Cyber Security, Threat Intelligence

2022 is turning out to be the year of nation-state actors. With attacks on wind turbine operations and public transit services in the Netherlands, utility firms in India, retail businesses in Taiwan, and stock markets in the US being traced to APT groups, this year...
Hackers are running a targeted phishing campaign around the ongoing T-20 World Cup

Hackers are running a targeted phishing campaign around the ongoing T-20 World Cup

by vikas.karunakaran | Nov 3, 2022 | Cyber Security, Threat Intelligence

Hackers have decided to latch on to the excitement generated by the ongoing T-20 World Cup in Australia. Over the last two weeks, Sectrio’s threat research team intercepted/came across 20 emails that were targeted at senior executives from...
Cyber surveillance grids double up as cyberattack facilitation infrastructure

Cyber surveillance grids double up as cyberattack facilitation infrastructure

by vikas.karunakaran | Oct 21, 2022 | Cyber Security, Threat Intelligence

Large-scale domestic and international surveillance and activity-tracking grid operated by a large South East Asian country are also enabling its APT teams to strike deep into the digital territories of other countries. This country has invested extensively in...
Complete Guide to Cyber Threat Intelligence Feeds

Complete Guide to Cyber Threat Intelligence Feeds

by Sectrio | Jun 21, 2022 | Cyber Security, Threat Intelligence

Cyber Threat Intelligence [CTI] Feeds – The devil is in the details Whether your firm is looking for a cybersecurity vendor to meet your needs or your employees are undergoing a training program, it is important to understand how cyber Threat Intelligence Feeds form...
What is good threat intelligence?

What is good threat intelligence?

by Prayukth K V | Jan 13, 2022 | Featured, OT, Threat Intelligence

When it comes to threat hunting and neutralization, threat intelligence is not just essential but is the very foundation on which any threat management effort rests. Without the right cyber threat intelligence, your IoT and OT security could be compromised and your...
« Older Entries

Get the report!

Recent Posts

  • Prioritizing OT Network Segmentation: TSA Issues Emergency Cybersecurity Amendment for Critical Infrastructure
  • The cybersecurity link to the Chinese spy balloon episode
  • Complete Guide to Zero Trust Security
  • 2023 will be an important year for cybersecurity in India
  • Complete guide to OT network segmentation
Workplace Westminster London Dubai Mumbai Bangalore Singapore

1499 W. 120th Ave, Ste 210 Westminster, CO 80234
Tel: +1 303 301 6200
Fax: +1 303 301 6201

1st Floor, Rama Apartment,17 St Ann’s Road, Harrow, Middlesex, HA1 1JU
Tel : +44 0207 8265300
Fax : +44 0207 8265352

#Office number 722, Building number 6WA, Dubai Airport Free Zone Authority(DAFZA), P.O. Box: Box 54834,Dubai United Arab Emirates
Tel : +9 714 214 6700
Fax : +9 714 214 6714

Level 13, R-Tech Park, Nirlon Knowledge Park, Off Western Express Highway, Goregaon (E) – Mumbai 400063
Tel : +91 22 4476 4567

Pritech Park, SEZ Block -09, 4th Floor B Wing Survey No. 51 to 64/4 Outer Ring Road, Bellandur Village Varthur, Hobli, Bengaluru, Karnataka 560103, India
Tel : +91 80 6659 8700
Fax : +91 80 6696 3333

175A Bencoolen Street #08-03 Burlington Square Singapore 189650
Tel : +65 6338 1218
Fax: +65 6338 1216

  • Follow
  • Follow
  • Follow
  • Follow

Solutions

By Industry

By Compliance

Products

Sectrio Hub
Sectrio Edgetech
Vulnerability Management
Threat Management

Micro Segmentation
5G Security Suite
Threat Intelligence

Services & Support

Asset Management
Incident Management
Consulting Services
Security for digital transformation

Quick Links

Company
Partners
Careers
Contact
Blog
Case Studies
Media Coverage
Whitepapers
Spanish-Site Index

© Copyright SECTRIO 2023. All Rights Reserved. Privacy Policy