Blog
Active Query issue in OT SOC
An active query issue in an OT (Operational Technology) SOC (Security Operations Center) SIEM (Security…
Debunking the Myth: Is it So Easy to Penetrate VPNs Through Parasite?
Introduction:Virtual Private Networks (VPNs) are widely used to enhance privacy and security while browsing the…
God Save Us from Hexane Attacks on Operational Technology (OT) Systems
Introduction:The world is becoming increasingly interconnected, and with this interconnectivity comes the need for robust…
Can Anyone Stop Dymalloy Attacks on Industrial Control Systems (ICS)?
Introduction:In the digital age, where industrial processes heavily rely on interconnected systems, the threat of…
Electrum: The Killer of Grids
Introduction:In today’s world, where digital assets and cryptocurrencies have gained immense popularity, the need for…
Unveiling the Threat: Killing VPNs with Stibnite
IntroductionWith the rise in remote work and the increased use of Virtual Private Networks (VPNs)…
The Nightmare of Kamacite on an ICS Network
Introduction In the world of cybersecurity, the risks associated with Industrial Control Systems (ICS) have…
Petrovite: Unveiling the ICS Chain Killer
Introduction:As Industrial Control Systems (ICS) continue to evolve and become more interconnected, the potential for…
The ICS Destroyer: Unveiling the Threat of Kostovite
Introduction:In recent years, the increased reliance on Industrial Control Systems (ICS) across various sectors has…
The Killer Instinct of Erythrite on Industrial Control Systems (ICS)
Introduction:Erythrite, also known as cobalt bloom or cobaltite, is a vividly colored mineral primarily composed…