Introduction GoalThis document aims to create awareness and share insights on the benefits of leveraging cloudcomputing for Industrial Control Systems (ICS) and Operational Technology (OT). It...
Day: August 6, 2022
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it will be brought to a...
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a policyframework of computer security guidance for how private sector organizations in the United States...
40 Methods for Privilege Escalation P1 by Hadess
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from...
Ransomware in a Global Context Report 2021 by Virustotal
Welcome to VirusTotal’s first Ransomware Activity Report. This initiative is designed to help researchers, security practitioners and the general public better understand the nature of ransomware...
History of Supply Chain Attacks in the News by SentinelOne
Here’s a quick breakdown of the most impactful supply chain attacks over the last decade or so.