top of page


Risk Assessments in OT Environments – An Illustration Based on a Recent Attack
Automating risk assessments in OT - how to model risk with Radiflow CIARA, based on a recent attack against Unitronics devices.
Apr 9, 2024


XZ Backdoor: Supply Chain Attack Against Open Source?
The compromise of a key Linux library shows how the open source process is vulnerable to threat actors.
Apr 3, 2024


Volt Typhoon: Techniques Used to Compromise Operational Technology
Volt Typhoon, apparently a state-sponsored threat actor, employs a set of techniques to breach critical infrastructure across the world.
Apr 2, 2024


Lessons from HANFA’s Ransomware Incident
Key takeaways from the recent ransomware attack against a Croatian government agency.
Mar 27, 2024


Phishing Resistant Authentication: Options are Getting Better
Phishing-resistant authenticators based on FIDO2 passkeys are evolving, and options for organizational users are getting better.
Mar 25, 2024


Ransomware accelerates the move to cloud services? The British Library case
Is ransomware in fact a trigger for IT infrastructure modernization, and indeed a cloud enabler?
Mar 18, 2024


The latest SEC cybersecurity incident disclosures - what's the result so far?
The latest cybersecurity incident disclosures following the U.S. SEC new rules: cyber attacks have only a modest impact?
Mar 14, 2024


UnitedHealth ransomware attack - what's behind it?
Digital transformation makes healthcare vulnerable? Or are legacy systems with poor security awareness to blame?
Mar 8, 2024


Business Email Compromise (BEC), more costly than ransomware?
A BEC attack appears to be behind the recent heist at Pepco Group (see here): its Hungarian subsidiary lost about 15,5M EUR in cash....
Mar 6, 2024
bottom of page
