top of page


MS365 Services and Windows App Installer - new malware techniques
New ways to trick users are exploiting Microsoft online services and Windows: continuously educating users on IT threats remains critical.
Jan 12, 2024


SEC's New Cybersecurity Rule Triggered on First Day
New SEC rules on cyber incident disclosure by companies listed on U.S. stock exchange are now enforced. A first case is in.
Dec 20, 2023


Threat Actors Exploit Cloud Application Identities To Gain Persistence
Threat actors are targeting resources on public clouds: in this case, leveraging application identities to bypass access controls.
Dec 19, 2023


ITDR - The new buzzword
Identity Threat Detection and Response (ITDR) is a relatively new buzzword in IT security. But its arrival is timely.
Dec 18, 2023


Critical Infrastructure Threat Landscape: Recent Attacks
Threat actors are learning fast and several are specifically targeting OT/ICS devices used to control industrial processes. Some recent ones
Dec 18, 2023


Water Supply Utilities Targeted by Threat Actors
Some evidence threat actors are turning specifically on OT equipment and assets found in industrial and critical infrastructure.
Dec 8, 2023


Lessons from the Recent Okta Breach
The breach at Okta revealed a more significant impact than initially disclosed. Some key lessons learned.
Dec 6, 2023


Cyber Attacks on Critical Infrastructure - how bad is it?
We've dug a little deeper into the Danish CERT report on an attack against critical infrastructure. Was it really serious?
Nov 27, 2023


The Case for Identity Threat Detection and Response
While it makes sense to detect malicious activity on endpoints, there is a strong case to integrate identity into EDR strategy.
Nov 20, 2023
bottom of page
