top of page

The Threat of Weaponizing Cybersecurity Regulations?
As a consequence of cybersecurity requirements to disclose incidents, ransomware operators are modifying their ransom requests and tactics.
Jan 15, 2024


MS365 Services and Windows App Installer - new malware techniques
New ways to trick users are exploiting Microsoft online services and Windows: continuously educating users on IT threats remains critical.
Jan 12, 2024

Querying vulnerable OT devices in the Adriatics
Most attacks against organizations with industrial control systems (ICS) or operational technology (OT) are still the usual ransomware...
Jan 5, 2024

Single Vendor SASE - what's in it?
2023 has seen the first edition of what Gartner calls "Single-Vendor SASE" (SVSASE).
Dec 29, 2023
![[Watch Now] Operationalized Risk Management in OT](https://static.wixstatic.com/media/83b8eb_d2ec1cd45db046d791a6c87a2ae0de24~mv2.png/v1/fill/w_297,h_222,fp_0.50_0.50,q_95,enc_avif,quality_auto/83b8eb_d2ec1cd45db046d791a6c87a2ae0de24~mv2.webp)
[Watch Now] Operationalized Risk Management in OT
Listen to Paul Gaynor from Radiflow discussing operationalized risk management in OT, especially in the context of NIS2.
Dec 21, 2023

SEC's New Cybersecurity Rule Triggered on First Day
New SEC rules on cyber incident disclosure by companies listed on U.S. stock exchange are now enforced. A first case is in.
Dec 20, 2023


Threat Actors Exploit Cloud Application Identities To Gain Persistence
Threat actors are targeting resources on public clouds: in this case, leveraging application identities to bypass access controls.
Dec 19, 2023


ITDR - The new buzzword
Identity Threat Detection and Response (ITDR) is a relatively new buzzword in IT security. But its arrival is timely.
Dec 18, 2023

Critical Infrastructure Threat Landscape: Recent Attacks
Threat actors are learning fast and several are specifically targeting OT/ICS devices used to control industrial processes. Some recent ones
Dec 18, 2023
bottom of page