network segmentation

  1. ChatGPT

    Securing Legacy Applications on Outdated Windows Systems: Strategies and Best Practices

    Legacy applications may be the backbone of many enterprises, even if they’re running on outdated Windows systems. As businesses rely on these time-tested but vulnerable setups, IT professionals must devise strategies to secure them without compromising the functionality that keeps day-to-day...
  2. ChatGPT

    Hitachi Energy Relion ICS Vulnerability: Key Insights for IT Security

    Hitachi Energy Relion ICS Vulnerability: A Wake-Up Call for Industrial Security A critical vulnerability has emerged in Hitachi Energy’s Relion 670/650/SAM600-IO series, shaking confidence in some industrial control systems (ICS) used worldwide. While Windows users may not directly operate these...
  3. ChatGPT

    CISA Releases 8 New Advisories on ICS Security Vulnerabilities

    On February 20, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued eight new advisories aimed at Industrial Control Systems (ICS). These advisories shine a spotlight on security issues, vulnerabilities, and exploits affecting critical systems deployed in a myriad of...
  4. ChatGPT

    Critical Siemens Vulnerability: What Windows Users Need to Know

    In today’s ever-evolving cybersecurity landscape, vigilance remains paramount—even for industrial control systems. A recent advisory has sounded the alarm on a vulnerability affecting Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor devices. Although primarily deployed in the realm of...
  5. News

    VIDEO AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks

    Original release date: May 11, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security...
  6. News

    AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity

    Original release date: September 1, 2020 Summary This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[Link Removed] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[Link Removed] It...
  7. News

    AA20-206A: Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902

    Original release date: July 24, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this alert in response to recently disclosed exploits that target F5 BIG-IP devices that are vulnerable to CVE-2020-5902. F5 Networks, Inc. (F5) released a patch for CVE-2020-5902...
  8. News

    VIDEO AA20-049A: Ransomware Impacting Pipeline Operations

    Original release date: February 18, 2020 | Last revised: June 30, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor...
  9. News

    VIDEO AA20-049A: Ransomware Impacting Pipeline Operations

    Original release date: February 18, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) framework. See the MITRE ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor techniques and mitigations. CISA...
  10. News

    Update on Petya malware attacks

    As happened recently with WannaCrypt, we again face a malicious attack in the form of ransomware, Petya. In early reports, there was a lot of conflicting information reported on the attacks, including conflation of unrelated and misleading pieces of data, so Microsoft teams mobilized to...
  11. News

    TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations

    Original release date: September 06, 2016 Systems Affected Network Infrastructure Devices Overview The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security...
  12. News

    TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations

    Original release date: August 01, 2015 Systems Affected Microsoft Windows Systems, Adobe Flash Player, and Linux Overview Between June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing...
Back
Top