ColorTokens OT-in-a-Box: From Concept to Completion

ColorTokens OT-in-a-Box: From Concept to Completion

This year, we had a fantastic time meeting attendees, partners, friends, and customers at the RSA Conference Expo floor. You probably noticed this contraption attached to our coffee machine if you stopped ...
industrial, SCADA

The Hidden Security Risk on Our Factory Floors

ICS and SCADA (supervisory control and data acquisition) networks were built as isolated systems, never meant to connect to the internet ...
Security Boulevard

Emulating the Sophisticated Russian Adversary Seashell Blizzard

AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Russian adversary Seashell Blizzard. The post Emulating the Sophisticated Russian Adversary ...

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated Russian criminal adversary known as FIN7 based on activities observed between 2022 and 2023. The ...

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024. The post Emulating ...
FBI data storage devices, security

Report: Manufacturing Remains Atop Cyberattack Leader Board

A report published today by Critical Start, a provider of managed cybersecurity services, finds cyberattacks in the first half of 2024 continued to focus on vertical industries that are rich in critical ...
Security Boulevard

Emulating the Politically Motivated North Korean Adversary Andariel – Part 2

AttackIQ has released a new attack graph that emulates the behaviors exhibited by the North Korean state-sponsored adversary Andariel during Operation Blacksmith which affected manufacturing, agricultural and physical security companies in multiple ...

Identity Security Is the Key to Managing Manufacturers’ Supply Chain Cyber Risk 

What’s the weakest link in a manufacturer’s security architecture? One of the common answers is ‘the one you can’t control’, with third-party access being the most prominent example. Supply chain attacks are ...

How SBOM Data Enhances Cybersecurity and Response Operations

By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) At the RSA Security Conference (RSAC) last month, a multitude of vendors and speakers ...

Emulating the Long-Term Extortionist Nefilim Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by the extortionist ransomware Nefilim during activities against multiple organizations, primarily based in North or South America, distributed in the ...