Blog
Welcome to our blog
Understanding the EU Cyber Resilience Act: A Game-Changer for Cybersecurity
Navigating New Requirements for Connected Products Summary: The EU Cyber Resilience Act (CRA) introduces a transformative approach to cybersecurity, mandating security integration across the entire lifecycle of products with digital elements. Targeting manufacturers, importers, and distributors, the CRA enforces strict requirements, including secure-by-design principles, mandatory vulnerability reporting within 24 hours,...
Colonial Pipeline Hack: What We Know So Far
Ransomware attack halts Sierra Wireless Production Activities
Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach
Shell, the multinational oil giant, disclosed in late March that the personal information of some of its stakeholders and business data from linked organizations have been compromised after a successful attack on its network. It was disclosed by the company that a still-unknown malicious agent breached into the system, accessing...
Reactions to U.S. Water Plant Hack
In the second week of February 2021, the U.S. government revealed that unknown hackers had gained remote access to systems at a water plant in Florida City. The hackers attempted to raise the levels of certain chemicals to an extent where members of the public would run the risk of...
Japan’s Industries Targeted by Hackers Employing Backdoors
APT10, also known as Stone Panda, Cicada, POTASSIUM, and Red Apollo, was found to be behind a series of cyberattacks targeting industry sectors in Japan as part of a large, long-running campaign against the Asian country. By using novel malware, APT10 attacked companies deploying malicious backdoors in a sophisticated fashion....