Close this search box.

Throwback Attack: Elfin team changes tactics

Courtesy: Brett Sayles

In recent years, cybersecurity in critical infrastructure has been at the forefront of people’s minds. With attacks on the U.S.’s critical infrastructure, such as Colonial Pipeline, Kemuri Water Company and many more, cybersecurity threats aren’t […]


The MITRE ATT&CK framework is a publicly available knowledge base of observed adversary behaviors categorized into specific tactics and techniques across an adversary’s attack lifecycle. MITRE ATT&CK provides a taxonomy or vocabulary when discussing cybersecurity […]

Throwback Attack: Bad Rabbit ransomware hops across Europe

A hacker in the background.

In 1989, the first known ransomware attack occurred; 33 years later we are still being faced with more varied and complex ransomware incursions. Over the years, threat actors have found innovative ways to exploit vulnerabilities […]

How to improve OT network visibility

This blog is the first in a series expanding on each of these findings. Dragos determined 86% of service engagements have a lack of visibility across OT networks, down from 90% in 2020 compared to […]