TLS Attacks This is a follow up article which is titled as “Are TLS vulnerabilities considered critical for internal network?” We are listing a whole slew of attacks which originated with one thing in mind – to break SSL/TLS. At Read more…
Are TLS vulnerabilities considered critical for internal network? We will not go into what is TLS, how it works, why its important to security etc. We will assume that everyone know about it and directly jump to answering the question. Read more…
Case 1: Colonial pipeline ransomware attack Location: Houston, Texas The Colonial Pipeline ransomware attack was one of the most significant attacks in 2021. The attack caused a gasoline shortage crisis. The CEO of the company testified in front of the Read more…
Operational Technology uses hardware and software to monitor and control physical processes, devices, and infrastructure. They use specialized protocols and software to interface with legacy and proprietary systems to automate, monitor, and oversee the operations of industrial machines. The word Read more…
The term “operational technology” (OT) refers to a particular class of hardware and software whose function is to keep track of and manage the operation of physical equipment. In certain ways, OT is concerned with task-specific systems that are designed Read more…
Information Technology- Information technology, or IT, is the study of how to use systems, primarily computers, and telecommunications, to carry out a variety of tasks, including gathering input, storing, retrieving, transmitting, editing, and safeguarding data or information so that it Read more…