Information Security

July 1, 2018

The Ubiquity of Targets

When I heard about the Russian attacks on home routers using the VPNFilter malware, I had two immediate thoughts.  First, take care of my home router […]
September 21, 2017

Patching OT Systems – Why bother?

Malware exploiting zero-day vulnerabilities within Microsoft operating systems (OS) looks like a trend that is set to continue explains Serkan Yusuf (OT Security Consultant and Founder […]
August 17, 2017

Template Injection Attacks

Widely used by web applications, template engines allow the presentation of dynamic data in web pages and emails. Critical vulnerabilities frequently are found where user input […]
August 1, 2017

Operational Technology and Industry

Most people are familiar with the term Information Technology, or IT, and the way it refers to the use of computers in the storage, manipulation, transmission […]
June 28, 2017

‘Petya’ Ransomware Outbreak Goes Global

A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows […]
May 27, 2017

ICS Cyber Security – Is DUQU 2.0 An example of Artificial Intelligence (AI) Influenced Malware? By Mike Loginov

In this weeks Security@IOTSA Blog we focus on an emerging potential cyber security threat to the energy sector and indeed critical infrastructure at a local, national […]