Attacks and Vulnerabilities

MITRE unveils ATT&CK v15 with upgraded detections, analytic format, cross-domain adversary insights
MITRE unveils ATT&CK v15 with upgraded detections, analytic format, cross-domain adversary insights
Hackers target Tipton Municipal Utilities wastewater treatment plant, prompting federal investigation
Hackers target Tipton Municipal Utilities wastewater treatment plant, prompting federal investigation
New CGCYBER report warns of cybersecurity risks in marine environment due to network-connected OT systems
New CGCYBER report warns of cybersecurity risks in marine environment due to network-connected OT systems
Honeywell’s 2024 USB Threat Report reveals significant rise in malware frequency, highlighting growing concerns
Honeywell’s 2024 USB Threat Report reveals significant rise in malware frequency, highlighting growing concerns
CISA declares winners of President’s Cup cybersecurity competition, with Artificially Intelligent team leading
CISA declares winners of President’s Cup cybersecurity competition, with Artificially Intelligent team leading

Industrial Cyber Experts

Jonathon Gordon
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Rising cyber threats and attacks against critical infrastructure installations have led to the constant adaptation of the changing... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Kevin Kumpf
Addressing complexities of zero trust implementation in OT/ICS environments to bolster cybersecurity
Incorporating a zero-trust framework into OT (operational technology) and ICS (industrial control system) environments becomes imperative in addressing... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story