The Real Threat of Ransomware: Why Cyber Criminals Prefer This Attack Method Even for Industrial Organizations
cybersecurity, incident response, ir, ransomware, ThreatGEN
|Ransomware attacks have become an increasingly common threat to organizations of all types, from small businesses to large industrial organizations. While cyber-physical attacks are often seen as the greatest threat to industrial organizations, ransomware attacks can still have significant physical and/or life-threatening consequences. As demonstrated by recent incidents such as the attack on a hospital in Germany that caused the death of a patient, and the ransomware attack on a major airline in the United States that resulted in flight cancellations and disruptions to travel, the impact of ransomware on industrial systems can be just as serious as that of cyber-physical attacks, if not more so. Furthermore, many industrial organizations have complex supply chains that rely on interconnected systems and processes, so an attack on one organization can have ripple effects throughout the entire supply chain, as seen in the recent incidents involving the Colonial Pipeline and the world’s largest meat supplier, JBS. Given the ease of deployment and potential for profit, ransomware remains a serious threat to organizations, and it is essential for organizations to take steps to protect themselves against these types of attacks.
Tabletop Exercises in Cybersecurity and Beyond
cybersecurity, Tabletop Exercise, ThreatGEN® Red vs. Blue, TTX
|Learn how tabletop exercises can improve your cybersecurity plans and procedures and discover the next level of innovation in TTX.
ThreatGEN Increases Cybersecurity Student Engagement Aligned with Key Learning Objectives
cybersecurity, cybersecurity training, learning objectives
|ThreatGEN® Red vs. Blue provides a mapping to Bloom’s Taxonomy for student learning objectives.
Achieving a Stronger Cybersecurity Workforce
Despite a skills shortage in the cybersecurity industry, simply having a college degree is no longer enough. It’s still a competitive industry and employers are looking for candidates that are well qualified. Students need an educational program that prepares them for real-world cybersecurity and a successful career path. Unfortunately, traditional training methods just might not make the grade any longer. So, how do educators provide students with a solid cybersecurity foundation and set them up for success in the real world?
OT Cyber Risk Management – You’re Probably Doing It Wrong
cybersecurity, OT, riskmanagement
|The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them In this article, I will discuss the 3 most common mistakes people still make when assessing and addressing OT cyber risk management (hint: most of you are still doing it backwards), and ways that you can make…
Florida Water Treatment Plant Attack
cybersecurity, Florida water treatment plant attack, IDMZ, industrial cybersecurity, Industrial DMZ
|Since there are plenty of threat monitoring sources throughout our industry, we thought it best not to repeat those concerning the Florida water treatment plant attack. ThreatGEN believes it is worthwhile to have a lessons learned after the the dust settles though. The reason we didn’t release immediately after the event, like everyone else, is…
CTF – “You keep using that word. I do not think it means what you think it means.”
CTF, cybersecurity, cybersecuritytraining, ThreatGEN, ThreatGEN® Red vs. Blue
|Capture the flag (CTF) competitions are played in the cybersecurity community all over the world. What is its history? What are we missing?
What Could the SolarWinds Attack Mean for OT?
cybersecurity, industrialcybersecurity, Orion platform, solarwinds
|Jonathan Bundy reviews the SUNBURST malware attack on SolarWinds clients.
Gamification vs. Games
games, gamification, training
|ThreatGEN’s Aaron Shbeeb delves into the differences between games and gamification as well as defining good gamification attributes.
Lies, Damned Lies, and Cybersecurity Statistics
cybersecurity, cybsrecuritystatistics, gamification, ThreatGEN® Red vs. Blue
|ThreatGEN brings together multiples sources for its list of cybersecurity statistics, their sources, and some of our own.