Is Ransomware a real threat to ICS environments?

Introduction ICS environments are the control systems found in various industries such as manufacturing, oil, and gas, electric power generation, etc. Additionally, ICS security is concerned with the protection of these control systems, including the hardware and...

Vulnerability Analysis : CVE-2021-26857

Introduction This vulnerability exists in the Microsoft Exchange server attack chain, and this vulnerability is also known as the SSRF vulnerability. Hackers can use this vulnerability to authenticate user access when a hacker establishes an HTTPS connection....

Indirect Losses Resulting from a Cyberattack

The losses caused by network attacks directly or indirectly affect enterprises. In this article, we focus on indirect losses caused by a cyberattack. These indirect losses are often hard to quantify and hidden from the public eye, but the impact on businesses is still...