We see very often how companies (through their security staff) go shopping and rush to spend, often pushed by the pressure of the business, the inertia of the market, lack of knowledge, skill and opportunism of suppliers, before performing a good risk assessment.
Latest News
- Understanding Zones and Conduits December 27, 2023
- CISA warns of actively exploited Juniper pre-auth RCE exploit chain November 20, 2023
- The State of Knowledge and Risk Management in Industrial Cybersecurity (ISA/IEC-62443-3-2) November 15, 2023
- US energy firm shares how Akira ransomware hacked its systems October 27, 2023
- BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacks October 24, 2023
- Building automation giant Johnson Controls hit by ransomware attack September 30, 2023
- Cuba ransomware uses Veeam exploit against critical U.S. organizations August 25, 2023
- Industrial PLCs worldwide impacted by CODESYS V3 RCE flaws August 15, 2023
- Physical attacks on power grid surge to new peak – Power Grid Sabotage July 18, 2023
- Cisco warned customers of a high-severity cisco switch vulnerabilities. July 18, 2023
- CosmicEnergy ICS Malware Updates June 17, 2023
- Pemex refinery blaze injures four May 30, 2023
- What is Evil PLC attack and how to prevent negative consequences on industrial plants March 10, 2023
- CISA Warns of Flaws in Siemens, GE Digital, and Contec Industrial Control Systems February 10, 2023
- Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices January 28, 2023