By Adam Sewall Date: 1/21/2025 In 2024, cyber-attacks surged significantly, marking a banner year for hackers and foreign adversaries. The frequency and intensity of these attacks heightened across various sectors, including Critical Infrastructure, Enterprise, and SMEs. Within Critical Infrastructure, attacks focused on Operational Technology (OT) and Industrial Control Systems (ICS), impacting vital sectors like power,
Chinese APT Exploits API Key to Access U.S. Treasury Systems “On December 8, 2024, Treasury was notified by a third-party software service provider, BeyondTrust, that a threat actor had gained access to a key … to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users,” the
Enhanced Security for IoT, OT, and ICS Deployments can be accomplished with device and network security testing, including breach and attack simulation. Securing critical infrastructure, including ICS/OT and IIoT/IoT deployments, requires solutions that emulate cyberattacks to protect connected devices and the networks to which they are connected. Safety, uptime/continuity, and security are critical for
Date: Dec 10, 2024 By: Adam Sewall Insurance companies are in a unique position being responsible to protect PII/PHI/PCI and much, much more. In the news this week are both Geico and Travelers who have been fined a combined total of $11.3 million by the state of NY. Fines, include a $9.75M settlement with
ADVISORY NOTICE – ALL CYBERLEAF CUSTOMERS RE: Cyberleaf Preparation for Hurricane Milton Operations We hope this message finds you safe and well. As Hurricane Milton approaches the Florida coast, we want to assure you that Cyberleaf operations remain fully active and uninterrupted. We understand the importance of our services to your business, especially during challenging
In today’s complex and ever-evolving threat landscape, traditional security measures often fall short of protecting against sophisticated attacks. To stay ahead of malicious actors, organizations must adopt advanced threat intelligence techniques that go beyond static indicators of compromise (IOCs) and signature-based detection. The Limitations of Traditional Threat Intelligence Traditional threat intelligence methods, which rely