Malware, Phishing & Ransomware

Industrial environments are faced with rising threats from malware directly targeting the sector. Ransomware has escalated from a fledgling threat into a severe force that requires adequate preparation. Adversaries and cybercriminals also use phishing to lure their targets by sending fraudulent emails or other communications. Such messages are designed to look like they come from a trusted sender, with the intent of coaxing their victim to provide confidential information on a scam website. Often, malware gets downloaded onto a computer within the organization, making the impression that cybercrime attacks such as APTs and ransomware incidents usually begin with phishing.

CISA and FBI issue secure by design alert to urge manufacturers to remove directory traversal vulnerabilities
CISA and FBI issue secure by design alert to urge manufacturers to remove directory traversal vulnerabilities
House Committee emphasizes importance of CIRCIA implementation for cyber preparedness
House Committee emphasizes importance of CIRCIA implementation for cyber preparedness
Global cybersecurity agencies issue alert on threat to OT systems from pro-Russia hacktivist activity
Global cybersecurity agencies issue alert on threat to OT systems from pro-Russia hacktivist activity
White House releases National Security Memorandum on critical infrastructure security and resilience
White House releases National Security Memorandum on critical infrastructure security and resilience
AI for Energy - Opportunities for a Modern Grid and Clean Energy Economy (DoE)
US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure

Industrial Cyber Experts

Jonathon Gordon
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Organizations across the industrial cybersecurity space are constantly dealing with challenges including software breaches, hardware vulnerabilities, supply chain... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Sinclair Koelemij
Creating cohesive OT risk strategy through cybersecurity measures and collaboration with engineering
In today’s rapidly evolving technological landscape, the need to address a comprehensive approach to risk management is crucial... Read full story