Critical Infrastructure

Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas
An alert from CISA, FBI, EPA and DOE came after CISA observed attacks by “unsophisticated” cyber actors leveraging “basic and elementary intrusion techniques” against ICS/SCADA systems. ...
Security Boulevard

WarGames – it’s not 1983 anymore
MixMode Threat Research | | APT41, Blog, Brass Typhoon, Critical Infrastructure, Cyber Threats, Infrastructure, nation-state attacks, Nation-State Bad Actors, Nation-State Threat Actors, national cybersecurity, National Cybersecurity Strategy, Salt Typhoon, threat brief, Threat Briefing, Threat Intelligence Research, Threat Research, Volt Typhoon, Zero Day Attacks, zero trust
China’s state-sponsored cyber operations, driven by groups like Volt Typhoon, Salt Typhoon, Brass Typhoon, and APT41, and amplified by techniques like Fast Flux DNS, are not chasing Hollywood apocalypse—they’re seizing America’s networks, ...

The Illusion of Safety: BlackCloak’s DEP Security Framework Exposes the Devil’s Greatest Trick
On Tuesday, March 25, 2025, BlackCloak released a watershed asset in executive and public persona cybersecurity: The Digital Executive Protection (DEP) Framework & Assessment Methodology - a comprehensive standard designed to address ...
Security Boulevard

MixMode Uncovers Nation-State Attacks, Insider Threats, and Regulatory Risks in Critical Infrastructure Environment within 3 Days of Deployment
MixMode Threat Research | | Blog, case-study, Critical Infrastructure, Customer Success Story, Cyber Threats, Infrastructure, nation-state attacks, Nation-State Threat Actors, Real Time Threat Detection, threat actors, threat detection, Threat Research, use case, whitepaper
In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform ...

Building Resilience Into Cyber-Physical Systems Has Never Been This Mission-Critical
Our nation’s critical infrastructure is increasingly brittle and under attack. Take the recent report that the drinking water of millions of Americans is at risk due to technical vulnerabilities ...
Security Boulevard

Threat Research Recap: Paving the Way for Smarter Defense Tech in 2025
MixMode Threat Research | | Blog, Cities, Critical Infrastructure, nation-state attacks, Nation-State Bad Actors, Nation-State Threat Actors, national cybersecurity, National Cybersecurity Strategy
Looking back at 2024, we recognize the immense value in revisiting some of our most impactful threat research. These articles not only offered real-time insights into pressing cybersecurity issues but also set ...
Response to CISA Advisory (AA24-326A): Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
Ayelen Torello | | adversary emulation, CISA Alert, Critical Infrastructure, cyber resilience, Cybersecurity Advisory (CSA), Red Team Assessment (RTA), Red Teaming
In response to the recently published CISA Advisory (AA24-326A) which highlights the CISA Red Team's simulation of real-world malicious cyber operations, AttackIQ has provided actionable recommendations to help organizations emulate these attacks ...

Protecting Critical Infrastructure with Zero-Trust and Microsegmentation
Ransomware attacks are increasingly targeting critical infrastructure — essential systems like energy, water, transportation and finance. In 2023 alone, over 40% of attacks hit these sectors, according to the FBI. Meanwhile, agencies ...
Security Boulevard

Bridging the Gap: The Challenges of IT and OT Convergence
Joe Ariganello | | Blog, Compliance, Critical Infrastructure, Infrastructure, IT, OT, regulations, Regulations & Compliance
Operational Technology (OT) networks and Industrial Control Systems, the backbone of critical infrastructure, have traditionally operated in isolation and designed more for reliability and efficiency than security. The increasing convergence of IT ...
Emulating the Destructive WhisperGate Malware
Ayelen Torello | | adversary emulation, Critical Infrastructure, Cybersecurity Advisory (CSA), Malware, Ukraine, WhisperGate
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with the destructive WhisperGate malware. The post Emulating the Destructive WhisperGate Malware appeared first ...