manufacturing

ColorTokens OT-in-a-Box:Â From Concept to Completion
This year, we had a fantastic time meeting attendees, partners, friends, and customers at the RSA Conference Expo floor. You probably noticed this contraption attached to our coffee machine if you stopped ...

The Hidden Security Risk on Our Factory Floors
ICS and SCADA (supervisory control and data acquisition) networks were built as isolated systems, never meant to connect to the internet ...
Emulating the Sophisticated Russian Adversary Seashell Blizzard
AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Russian adversary Seashell Blizzard. The post Emulating the Sophisticated Russian Adversary ...
Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2
AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated Russian criminal adversary known as FIN7 based on activities observed between 2022 and 2023. The ...
Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1
AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024. The post Emulating ...

Report: Manufacturing Remains Atop Cyberattack Leader Board
A report published today by Critical Start, a provider of managed cybersecurity services, finds cyberattacks in the first half of 2024 continued to focus on vertical industries that are rich in critical ...
Emulating the Politically Motivated North Korean Adversary Andariel – Part 2
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the North Korean state-sponsored adversary Andariel during Operation Blacksmith which affected manufacturing, agricultural and physical security companies in multiple ...
Identity Security Is the Key to Managing Manufacturers’ Supply Chain Cyber RiskÂ
What’s the weakest link in a manufacturer’s security architecture? One of the common answers is ‘the one you can’t control’, with third-party access being the most prominent example. Supply chain attacks are ...
How SBOM Data Enhances Cybersecurity and Response Operations
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) At the RSA Security Conference (RSAC) last month, a multitude of vendors and speakers ...
Emulating the Long-Term Extortionist Nefilim Ransomware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by the extortionist ransomware Nefilim during activities against multiple organizations, primarily based in North or South America, distributed in the ...