Classic Supply Chain attack on critical infrastructure.
Classic Supply Chain attack on critical infrastructure.
Visibility throughout the day, keeps the hacker away.
Human manipulation 101.
Having your sensitive networks Air-gapped is not enough.
Mitigating an ATM attack (and saving the day).
There are various Raspberry Pi risks. A Raspberry Pi can carry out malicious activity, making it a Rogue Device. It is crucial to address the device’s security risks.
What happens when your ATMs are not secured enough.
Bad USB (badusb) attacks can compromise computer systems by exploiting firmware, posing serious security risks and hardware-based attacks.
Data centers are vulnerable to hardware attacks, which is why data center security is crucial.
There are many security threats in a Raspberry Pi. Through a payload, it can be instructed to carry out malicious activity-making it a Rogue Device.
Rogue devices are an increasingly used attack tool due to their invisibility to security software-as the attack occurs on the Physical Layer.
A Tier 1 bank audit revealed some irregularities and it became evident that an external party had continuous access to the internal and secured parts of the network. An investigation started…
As part of an academic security research that included the scanning of repositories of files, researchers came across classified operational documents that belonged to a large natural gas utility operator.
Read Sepio’s whitepaper on cyber security threats to critical infrastructures and discover how Sepio’s solution can help your organization address these threats.