Blog

Welcome to our blog

Understanding the EU Cyber Resilience Act: A Game-Changer for Cybersecurity

Navigating New Requirements for Connected Products Summary: The EU Cyber Resilience Act (CRA) introduces a transformative approach to cybersecurity, mandating security integration across the entire lifecycle of products with digital elements. Targeting manufacturers, importers, and distributors, the CRA enforces strict requirements, including secure-by-design principles, mandatory vulnerability reporting within 24 hours,...

Colonial Pipeline Hack: What We Know So Far

On May 7th, Colonial Pipeline experienced a significant cyberattack that resulted in a total shutdown of its operations, leading to widespread fuel shortages. Shortly thereafter, it became evident that the incident involved ransomware, with reports indicating that the company made a payment of nearly US$5 million to the attackers, which...

Ransomware attack halts Sierra Wireless Production Activities

Sierra Wireless, a leader in internet-of-things solutions, recently fell victim to a significant ransomware attack that brought its production activities to a standstill. The incident, which began on March 20th, not only disrupted manufacturing but also affected internal operations and the company’s website. As the team works diligently to restore...

Stakeholders’ Personal Records Leaked in Recent Shell/Accellion Breach

Shell, the multinational oil giant, disclosed in late March that the personal information of some of its stakeholders and business data from linked organizations have been compromised after a successful attack on its network.  It was disclosed by the company that a still-unknown malicious agent breached into the system, accessing...

Reactions to U.S. Water Plant Hack

In the second week of February 2021, the U.S. government revealed that unknown hackers had gained remote access to systems at a water plant in Florida City. The hackers attempted to raise the levels of certain chemicals to an extent where members of the public would run the risk of...

Japan’s Industries Targeted by Hackers Employing Backdoors

APT10, also known as Stone Panda, Cicada, POTASSIUM, and Red Apollo, was found to be behind a series of cyberattacks targeting industry sectors in Japan as part of a large, long-running campaign against the Asian country. By using novel malware, APT10 attacked companies deploying malicious backdoors in a sophisticated fashion....