Malware, Phishing & Ransomware

Industrial environments are faced with rising threats from malware directly targeting the sector. Ransomware has escalated from a fledgling threat into a severe force that requires adequate preparation. Adversaries and cybercriminals also use phishing to lure their targets by sending fraudulent emails or other communications. Such messages are designed to look like they come from a trusted sender, with the intent of coaxing their victim to provide confidential information on a scam website. Often, malware gets downloaded onto a computer within the organization, making the impression that cybercrime attacks such as APTs and ransomware incidents usually begin with phishing.

New CGCYBER report warns of cybersecurity risks in marine environment due to network-connected OT systems
New CGCYBER report warns of cybersecurity risks in marine environment due to network-connected OT systems
Ukrainian CERT details malicious plan by Sandworm group to disrupt critical infrastructure facilities
Ukrainian CERT details malicious plan by Sandworm group to disrupt critical infrastructure facilities
Honeywell’s 2024 USB Threat Report reveals significant rise in malware frequency, highlighting growing concerns
Honeywell’s 2024 USB Threat Report reveals significant rise in malware frequency, highlighting growing concerns
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
Enhancing industrial cybersecurity by tackling threats, complying with regulations, boosting operational resilience
MITRE confirms breach on NERVE network, suspected foreign nation-state actor involved
MITRE confirms breach on NERVE network, suspected foreign nation-state actor involved

Industrial Cyber Experts

Jonathon Gordon
Continuous need to face challenges, build strategies across industrial cybersecurity amidst evolving threats
Rising cyber threats and attacks against critical infrastructure installations have led to the constant adaptation of the changing... Read full story
Paul Veeneman
Growing convergence of geopolitics and cyber warfare continue to threaten OT and ICS environments in 2024
As we move into 2024, the influence of geopolitics on cyber warfare has become increasingly pronounced, with rising... Read full story
Tom Alrich
Navigating industrial cyber threats with SBOMs, VEX, CSAF for enhanced supply chain resilience
A significant rise in cybersecurity threats and attacks, particularly targeting software supply chains, has led to heightened scrutiny... Read full story
Sinclair Koelemij
Creating cohesive OT risk strategy through cybersecurity measures and collaboration with engineering
In today’s rapidly evolving technological landscape, the need to address a comprehensive approach to risk management is crucial... Read full story