Cyber Security Blog

Its All About Ethics

Posts by: Nidhi

Real Life OT Security Incidents

Case 1: Colonial pipeline ransomware attack Location: Houston, Texas The Colonial Pipeline ransomware attack was one of the most significant attacks in 2021. The attack caused a gasoline shortage crisis. The CEO of the company testified in front of the Read more…

Introduction to OT Security

Operational Technology uses hardware and software to monitor and control physical processes, devices, and infrastructure. They use specialized protocols and software to interface with legacy and proprietary systems to automate, monitor, and oversee the operations of industrial machines. The word Read more…

Difference between OT and IoT

The term “operational technology” (OT) refers to a particular class of hardware and software whose function is to keep track of and manage the operation of physical equipment. In certain ways, OT is concerned with task-specific systems that are designed Read more…

Difference between IT and OT

Information Technology- Information technology, or IT, is the study of how to use systems, primarily computers, and telecommunications, to carry out a variety of tasks, including gathering input, storing, retrieving, transmitting, editing, and safeguarding data or information so that it Read more…

VAPT techniques for IoT

The Internet of Things is an emerging technology. The Internet of Things (IoT) is the system of physical objects like devices, vehicles, homes, and different things embedded with electronics, software, sensors, and network connectivity that empowers these objects to gather Read more…

VAPT Techniques for REST APIs

Every year, a hundred thousand APIs become available on the internet. API (application programming interface) is nothing but a language used among various applications. Studies show that API abuses will become the most common type of web application-related attacks, which Read more…