Unmasking Ransomware: Key Challenges And Strategic Responses In Critical Infrastructure Sectors – A Mid-2024 Review


Since 2015, ransomware attacks have become a significant threat that organizations and enterprises cannot afford to ignore, especially as critical infrastructure sectors (CI) increasingly embrace digitalization. Due to IT and OT convergence, even OT environments have become targets for ransomware groups. In 2023, ransomware attacks were the most frequent incidents faced by OT environments, fol... » read more

Securing The Supply Chain: CMMC Essentials For Defense Contractors In OT Cybersecurity


Since September 2020, there have been several global supply chain attacks such as SolarWinds, Kaseya, NPM IconBurst, and Cyber Av3ngers Unitronics. Many of these incidents involved nation-state actors and resulted in significant disruptions and failures. In this threat landscape, the Department of Defense and critical infrastructure sectors have frequently and repeatedly come under attack, sust... » read more

Startup Funding: Q2 2024


AI drew more investors to the chip industry in Q2. Four AI-focused chip startups receiving rounds of more than $100 million, targeting data center ASICs for transformers, highly flexible platforms for the embedded edge, dataflow processors, and mixed-signal neuromorphic chips. In-memory computing also helped boost AI, with three companies either incorporating it into their chips or providing sp... » read more

Securing Semiconductor Manufacturing: Tackling Cybersecurity Challenges in SECS/GEM Protocols


As the global demand for electronics continues to surge, the semiconductor market has reached unprecedented revenue levels. The industry’s value chain comprises four critical stages, each presenting unique cybersecurity challenges: -Integrated Circuit Design Engineers design the layout and functionality of integrated circuits using Electronic Design Automation (EDA) tools. -Photomask P... » read more

Cyber Threats To The SECS/GEM Protocol In Smart Manufacturing


Semiconductors are an indispensable part of modern electronic products and are also a fundamental basis for the development of the AI industry. This industry is crucial for global economic growth and national security. As the semiconductor industry transitions to Industry 4.0, the connection between production equipment and factory networks has expanded the attack surface, providing adversaries... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Chip Industry Week In Review


Synopsys refocused its security priorities around chips, striking a deal to sell off its Software Integrity Group subsidiary to private equity firms Clearlake Capital Group and Francisco Partners for about $2.1 billion. That deal comes on the heels of Synopsys' recent acquisition of Intrinsic ID, which develops physical unclonable function IP. Sassine Ghazi, Synopsys' president and CEO, said in... » read more

SRAM Security Concerns Grow


SRAM security concerns are intensifying as a combination of new and existing techniques allow hackers to tap into data for longer periods of time after a device is powered down. This is particularly alarming as the leading edge of design shifts from planar SoCs to heterogeneous systems in package, such as those used in AI or edge processing, where chiplets frequently have their own memory hi... » read more

Enhancing HMI Security: How To Protect ICS Environments From Cyber Threats


HMIs (Human Machine Interfaces) can be broadly defined as just about anything that allows humans to interface with their machines, and so are found throughout the technical world. In OT environments, operators use various HMIs to interact with industrial control systems in order to direct and monitor the operational systems. And wherever humans and machines intersect, security problems can ensu... » read more

Securing The Food Supply: Industrial Cybersecurity In The Food And Beverage Sector


This publication unpacks the various aspects of the food and beverage industry in relation to cybersecurity. The angles we explore are: Cyber Threats: The food, beverage, and agriculture sectors have become targets for cyber threats at an increasing rate, with 2021 standing out as the most severe. Alarmingly, this uptick did not have a corresponding decrease in the following years, remain... » read more

← Older posts