2021 will go down in history as the most successful year for hackers. According to rough estimates by our research team, almost a fifth of all attacks on OT and IoT installations succeeded to some degree in 2021. The data stolen from such attacks and the tactics...
2021 was certainly the year of big breaches. The size of breaches and the volume of cyberattacks went up significantly this year. How will the year 2022 pan out and what will be the major trends to watch out for? Our threat research team has put together a...
Securing IoT deployments has always been a complicated proposition. In addition to dealing with connected devices with a range of security levels and architectures, security teams also have to keep new and extremely potent malware at bay while ensuring no latency...
OT cybersecurity has not received adequate attention from cybersecurity teams globally and this is why a lot of cyberattacks succeeded in 2021. As 2022 emerges on the horizon, it will be pertinent to take a pause and look back at key cybersecurity lessons from 2021....
What is reply-chain phishing? Reply-chain phishing is used by hackers to insert themselves in legitimate conversations through compromised accounts. Unlike spear-phishing where hackers use fake email addresses that sound similar to legitimate ones in reply-chain...
Cyber threat intelligence can be defined as the evolution of cyber threat information after it has been collected, evaluated, and assessed in the context of its origin, accuracy, and reliability, and after extensive analysis through rigorous and structured tradecraft...