Blog

Blog

Medusa Ransomware: FBI and CISA Urge Organizations to Act Now to Mitigate Threat

The Medusa ransomware gang continues to present a major threat to the critical infrastructure sector, according to a newly-released joint advisory from the FBI, Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC).As of February 2025, the Medusa ransomware operation, which we have previously detailed on the Tripwire State of...
Blog

6 Potential Security Concerns With the Eventual Rollout of 6G

6G could be available by the end of the decade, which should decrease latency and connectivity speeds for users. However, these wireless networks present new cybersecurity challenges.What should industry professionals prepare for?What Is 6G?6G will be the sixth generation of wireless technology once it arrives. Experts say it could debut by 2030, though companies started 5G-Advanced integration in...
Blog

Cybersecurity Can’t Wait: Modern Enterprises Must Adapt

Technology is evolving at a startling pace, perhaps faster than ever before. Businesses are scrambling to reap the rewards of these technologies, especially AI. But do they recognize the cybersecurity risks associated with these changes? The World Economic Forum’s latest Global Risks Report suggests not. Digital Era, Digital ThreatsWe are truly living in the digital age. This brings many benefits....
Blog

The Growing Importance of Penetration Testing in OT and ICS Security

A critical aspect of manufacturing, energy, and transportation is Industrial Control Systems (ICS) and Operational Technologies (OT). The rapid pace of digital growth makes these systems susceptible to cyberattacks.OT and ICS system security is important, making penetration testing an essential activity. This tactic makes it possible to mitigate weaknesses so they are no longer vulnerabilities. It...
Blog

How to Secure Your Mobile Device: 9 Tips for 2025

Can you imagine a life without your smartphone? For most of us, this is a difficult task, and some younger readers will have never lived in a world without smartphones. The countless functionalities of modern mobile devices - surfing the web, booking appointments, setting up reminders, sharing files, instant messaging, video calling, mobile banking, and more – have made them essential to our daily...
Blog

Cactus Ransomware: What You Need To Know

What is the Cactus ransomware?Cactus is a ransomware-as-a-service (RaaS) group that encrypts victim's data and demands a ransom for a decryption key.Hundreds of organisations have found themselves the victim of Cactus since it was first discovered in March 2023, with their stolen data published on the dark web as an "incentive" to give in to the extortionists' demands.So far, so sadly normal. What...
Blog

Understanding the Abu Dhabi Healthcare Information and Cyber Security Standard

Abu Dhabi is boosting its healthcare system with the introduction of the Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS). This initiative, driven by the Department of Health—Abu Dhabi (DoH)—has been put in place to protect sensitive healthcare data, improve cybersecurity resilience, and keep healthcare services running smoothly.At a time when cyber threats are skyrocketing in...
Blog

What is SaaS Security Posture Management (SSPM)?

Over 80% of businesses use at least one Software-as-a-Service (SaaS) application in their operations, per a report by SaaS Academy. It’s easy to see why SaaS applications are the fulcrum of many businesses today. From collaboration tools to CRMs, SaaS platforms enable flexibility, scalability, and operational efficiency. However, this convenience also comes with several security risks.According to...
Blog

Agentic AI: Redefining the Future of Autonomy in Business

The evolution of artificial intelligence (AI) agents signals a profound transformation in how businesses operate. Unlike traditional AI models that process and respond to queries, Google defines that “Agents are autonomous and can act independently of human intervention.” At the same time, the World Economic Forum explains that an agent is “an entity that perceives its environment through sensors...
Blog

Beware of Fake Cybersecurity Audits: Cybercriminals Use Scams to Breach Corporate Systems

Companies are being warned that malicious hackers are using a novel technique to break into businesses - by pretending to offer audits of the company's cybersecurity.With ransomware and other cybersecurity threats high in the mind of many business owners, it is all too easy to imagine how many companies might react positively to an invitation to have the security of their networks tested.But...
Blog

Key Updates in the OWASP Top 10 List for LLMs 2025

Last November, the Open Web Application Security Project (OWASP) released its Top Ten List for LLMs and Gen AI Applications 2025, making some significant updates from its 2023 iteration. These updates can tell us a great deal about how the LLM threat and vulnerability landscape is evolving - and what organizations need to do to protect themselves.Sensitive Information Disclosure Risks GrowIn 2023,...
Blog

Protecting the Manufacturing Sector from Ransomware

The manufacturing sector has long been a favorite target for ransomware actors. However, the true scale of the issue has only recently become apparent: research published in Infosecurity Magazine last December revealed that ransomware attacks on manufacturing companies have caused an estimated $17bn in downtime since 2018. But why is the manufacturing sector so vulnerable? And what can...
Blog

Making Sense of Australia’s New Cybersecurity Legislation

Late last year, Australia’s Cyber Security Act 2024 received Royal Assent and became Law. It was a huge moment for cybersecurity legislation in Australia, serving as the country’s first-ever standalone cybersecurity law, addressing key legislative gaps, and bringing the country in line with international best practices. But what’s included in the Act? And what does it mean for businesses? Keep...
Blog

Cybersecurity for Electricity Distribution [2025 Update]

Electricity transmission and distribution are popular topics at the moment, especially as they pertain to utilities infrastructure security. These essential pillars of modern society are undergoing rapid digital transformation, with increased connectivity and technological sophistication harboring large-scale cybersecurity challenges.Electrical critical infrastructure is prone to a plethora of...
Blog

Malaysia's Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration

In December 2024, Malaysia passed its Data Sharing Bill 2024, a new piece of legislation aimed at streamlining data-sharing across federal government agencies. This bill promises to revolutionize how data is managed, shared, and secured within Malaysia's government, fueling a more efficient, innovative, and secure public sector.By enabling seamless data exchange between federal entities while...
Blog

Ransomware: The $270 Billion Beast Shaping Cybersecurity—Insights from Cyentia's Latest Report

Ransomware has evolved into one of the most devastating cyber threats of modern times, creating previously unimaginable financial and operational hardships for entities in every sector. As malicious actors employ increasingly sophisticated tools, honing their tactics and spreading their tentacles, understanding the key trends, targeted industries, and financial impact is at the heart of...
Blog

Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks

Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East.The Russian group, known as Storm-2372, has targeted government and non-governmental organisations (NGOs), as well as firms working in IT, defence, telecoms, health, and the...
Blog

Advanced Ransomware Evasion Techniques in 2025

Ransomware has become more than a threat—it's a calculated assault on industries, wielding AI-driven precision to bypass traditional defenses. Attackers adapt faster than ever, turning cybersecurity into a high-stakes race where falling behind isn't an option.As we step into 2025, organizations face an urgent need to outthink and outmaneuver these evolving adversarial attacks. The best way to...
Blog

#TripwireBookClub - Black Hat Bash: Creative Scripting for Hackers and Pentesters

Up Next from #TripwireBookClub is Black Hat Bash: Creative Scripting for Hackers and Pentesters by Dolev Farhi and Nick Aleks. This duo previously published Black Hat GraphQL, which we reviewed in March 2024.This book did not disappoint. I think that my favourite aspect of the book is the way that it uses stepping stones to get you through the book. Although I don’t teach anymore, I always think...
Blog

US Coast Guard Urged to Strengthen Cybersecurity Amid $2B Daily Port Risk

The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes ports, waterways, and vessels essential for transporting over $5.4 trillion worth of goods annually.The Government Accountability Office (GAO) has warned in a report published this week that America's maritime transportation system lacks a proper cybersecurity...