Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil

Why cyberspace remains largely unaffected amidst ongoing geopolitical turmoil

The lack of any large cyber incidents doesn’t mean things are still deep under. Instead, this could well be the lull before a cyberstorm.     Earlier this week, Iran-linked APT group Charming Kitten (aka Ballistic Bobcat APT, APT35, and Phosphorus) initiated a fresh cyber espionage campaign targeting 14 countries across the ... Read More
An integrated OT SOC: Cost or Investment?

An integrated OT SOC: Cost or Investment?

| | ICS, OT
A dedicated OT Security Operations Center offers a strong foundation for launching and supporting many institutional security measures such as continuous threat detection, unified view and visibility, and OT governance and policy implementation.  When done well, a managed OT SOC can serve as a nerve center for all OT security ... Read More
Why the new AI cybercrime tool is just the tip of the iceberg

Why the new AI cybercrime tool is just the tip of the iceberg

| | FEATURED, ICS, OT
Recent reports about the appearance of a new generative AI tool point to the levels of maturity that hackers have attained as far as leveraging AI is concerned. In the latest edition of our IoT and OT threat landscape report, we had predicted this trend with supporting data. Our prediction ... Read More
Looking ahead of CEA guidelines to secure the power sector in India

Looking ahead of CEA guidelines to secure the power sector in India

| | FEATURED, OT, Utilities
India’s Central Electricity Authority (CEA) issued the Cyber Security in Power Sector Guidelines 2021 in October 2021. The comprehensive guidelines are intended to help all power sector entities in India take measured steps to improve their overall cybersecurity posture and protect critical infrastructure from cyber attacks through specific interventions. The ... Read More
Deciphering the latest attack on AIIMS    

Deciphering the latest attack on AIIMS    

In the latest edition of our threat landscape report, Sectrio’s threat researchers had done a comprehensive analysis of the Indian cyber threat landscape, the actors, tactics, malware, and enablers. This report also highlighted the alarming levels of sophistication and maturity demonstrated by state-backed hackers that are targeting Indian critical infrastructure, ... Read More
Essential security practices in OT control systems

Essential security practices in OT control systems

| | FEATURED, ICS, OT
Operational Technology (OT) security controls include the measures, workflows and procedures put in place to protect various OT systems from cyber threats. OT systems are used to control, run and monitor critical infrastructure, such as those in power plants, water treatment facilities, and transportation systems. As these systems become increasingly ... Read More
How to implement micro segmentation in an OT environment

How to implement micro segmentation in an OT environment

| | FEATURED, ICS, OT
Micro segmentation is a proven security strategy that works by dividing a network into much smaller and more secure segments. This helps in limiting the spread of a cyberattack in case of a breach thereby containing the event and its implications. Microsegmentation involves creating security zones around individual devices, applications, ... Read More
Best practices for an OT patch management program

Best practices for an OT patch management program

| | FEATURED, ICS, OT
Having an OT Patch management program is critical from a security and operational perspective for industries in manufacturing or critical infrastructure. A comprehensive patch management program is an integral part of an organization’s overall risk management (and mitigation) strategy. It not only helps identify and prioritize vulnerabilities, and assess their ... Read More
Setting up an OT-ICS Incident Response Plan 

Setting up an OT-ICS Incident Response Plan 

| | FEATURED, ICS, OT
Operational Technology (OT) and Industrial Control System (ICS) are the backbones of critical infrastructure that controls and monitor physical processes. They are used in a wide range of industries, including energy, manufacturing, and transportation. OT and ICS systems are increasingly becoming targets of cyberattacks. In 2020, the Colonial Pipeline was ... Read More
AI-powered cyberattacks are evolving at a frightening pace

AI-powered cyberattacks are evolving at a frightening pace

| | FEATURED, ICS, iot, OT
The recently released IoT and OT threat landscape assessment and analysis report from Sectrio has revealed many previously unknown aspects of AI’s use in conceptualizing and executing cyberattacks. This report presents a detailed view of the models and techniques that hackers use to deploy AI for improving targeting, conducting scans, ... Read More