H2OSecCon 2025- a virtual security event for the water sector - happening May 20th. Register Now!
Resource Center
FBI PIN – Ransomware Actors Continue to Gain Access through Third Parties and Legitimate System Tools
Nov 09, 2023 in Cybersecurity
OpalOPC: Molemmat Oy's Tool for Industrial Cybersecurity
Nov 09, 2023 in Cybersecurity
Securing Against Zero-Day Threats: Insights and Countermeasures by Trend Micro
Nov 09, 2023 in Cybersecurity
Decoding Ransomware Attacks: Identifying Key Stages and Indicators of Compromise
Nov 09, 2023 in Cybersecurity
Dragos: OT Threat Intelligence in Cyber Assessment Framework (CAF)
Nov 09, 2023 in Cybersecurity
Supplemental Cyber Highlights – November 9, 2023
Nov 09, 2023 in Cybersecurity
CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – November 9, 2023
Nov 09, 2023 in Cybersecurity, OT-ICS Security, Federal & State Resources
TLP:AMBER Weekly Flashpoint Intelligence Reports: November 9, 2023
Nov 09, 2023 in Cybersecurity, Intelligence
FEMA and CISA Release Joint Guidance on Planning Considerations for Cyber Incidents
Nov 09, 2023 in Cybersecurity, Federal & State Resources
E-ISAC Report: Exploitation Attempts of “Citrix Bleed” Vulnerability (CVE-2023-4966) in the Electricity Sector
Nov 07, 2023 in Cybersecurity
Attackers Use Google Calendar RAT to Abuse Calendar Service as C2 Infrastructure
Nov 07, 2023 in Cybersecurity
IBM X-Force Unearths New GootBot Malware Variant
Nov 07, 2023 in Cybersecurity