Business intelligence firm Gartner labels security orchestration, automation, and response as "obsolete," but the fight to automate and simplify security operations is here to stay.
Remote Access Sprawl Strains Industrial OT Network Security
A veritable grab bag of tools used to access critical infrastructure networks are wildly insecure, and they're blobbing together to create a widening attack surface.
How Law Enforcement's Ransomware Strategies Are Evolving
The threat of ransomware hasn't gone away. But law enforcement has struck a blow by adjusting its tactics and taking out some of the biggest adversaries in the ransomware scene.
OT environments impacted by unrestricted remote access tool utilization
Seventy-nine percent of organizations also had OT networks with more than a pair of non-enterprise-grade remote access tools, which usually lack role-based access controls, auditing, multi-factor authentication, and session recording capabilities, as...
Novel PIXHELL attack could expose air-gapped computer data
Without the need for specialized audio equipment to conduct PIXHELL, threat actors could leverage social engineering and software supply chain attacks to distribute covert data exfiltration channel-triggering malware that would create an acoustic...