Frenos, a vendor of AI native operational technology (OT) security posture management, announced on Wednesday the launch of… The post
Frenos, a vendor of AI native operational technology (OT) security posture management, announced on Wednesday the launch of… The post
New research from Dragos observed that persistent mischaracterization of ransomware as solely an IT problem obscures growing risks… The post
New data from Intel 471 shows ransomware, fraud and state-linked operations are increasingly overlapping across Latin America, heightening… The post
The European Union Agency for Cybersecurity (ENISA) published its Cybersecurity Exercise Methodology, offering organizations comprehensive guidance in designing,… The post
Kaspersky researchers analyze a C++ and Python stealer dubbed “Arkanix Stealer”, which was active for several months, targeted wide range
Switzerland’s National Cyber Security Centre (NCSC) reported that 2025 was marked by strengthened operational capabilities and expanded cybersecurity… The post
Industrial cybersecurity firm Dragos identified three new OT (operational technology) threat groups as adversaries push beyond reconnaissance and… The post
Industrial cybersecurity firm Dragos reports the rise of specialized threat groups whose varied tactics are making it easier… The post
Legacy operational technology (OT) environments face rising identity-based threats as remote access expands across control networks and vendor connections. Multi-factor
In an era where breaches have become inevitable and artificial intelligence accelerates both attacks and defences, cybersecurity can… The post
Trellix announced Trellix SecondSight, a threat hunting service designed to proactively identify low-noise advanced threats often undetected, reducing… The post
Belden Inc. announced that Jeff Winter has joined the company as vice president of commercial strategy. In his… The post
Wiley, a publisher of scientific and professional research, and the International Society of Automation (ISA), a professional society… The post
Industrial control system (ICS) and operational technology (OT) incident response has to evolve for the current threat landscape,… The post
The U.S. Cybersecurity and Infrastructure Security Agency announced a series of virtual town halls to gather stakeholder input… The post
Cyolo, provider of secure remote privileged access for operational technology (OT) and cyber-physical systems (CPS), is entering 2026… The post
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has once again updated its Brickstorm Backdoor Malware Analysis Report,… The post
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released its 2025 Year in Review, outlining key actions taken… The post
Universities everywhere are feeling the pressure to keep pace with a rapidly changing industrial threat landscape, while also preparing graduates
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert amplifying a recent incident in Poland’s… The post
Cybersecurity policies require that cyber incidents be identified as such. Cyber incident response plans are then initiated after incidents are
OPSWAT, a vendor of critical infrastructure protection (CIP) cybersecurity solutions, announced on Thursday the appointment of Jan Miller… The post
Palo Alto Networks announced on Wednesday completion of its acquisition of CyberArk, establishing Identity Security as a core… The post
New data from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag-ISAC) shows ransomware activity… The post
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released new guidance aimed at closing long-standing gaps in OT… The post