Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities

Let’s explore the critical role of Modbus in energy and manufacturing systems, then demonstrate real-world exploitation techniques using Docker-based simulations and the custom-built Python tool M.A.T.R.I.X. The danger here is an attacker who gains unauthorized access to a misconfigured Modbus TCP server can send malicious write commands to turn coils ON or OFF, thereby illegally activating or deactivating physical devices.

Strengthen Your Cyber Insurance Position: Why Proactive API Security is Key

Navigating the cyber insurance market in 2025 feels tougher than ever. Premiums are rising, requirements are stricter, and underwriters are scrutinizing security controls with unprecedented detail. While you're likely focused on endpoint security, MFA, and backups, are you overlooking a critical attack surface that insurers increasingly care about?

People, Process, Technology: How Cybersecurity Automation Fuels the Virtuous Circle

Cybersecurity isn’t just about tools and firewalls — it’s about people. Cybersecurity automation is proving to be a game-changer, not only for security outcomes but also for the people behind them. For many organizations, automation is now tightly aligned with employee satisfaction and retention. In fact, 47% of organizations see workforce morale as a key performance indicator (KPI) when evaluating the return on investment (ROI) of their cybersecurity automation efforts.

Integrating control graphs for holistic risk management

Enterprises around the globe are transitioning to integrated frameworks that encompass multiple risk dimensions, ensuring that risk identification, evaluation, and mitigation are conducted in a holistic manner. One of the emerging methods in this domain is the integration of control graphs into risk management frameworks.

It's Time! All PCI 4.0 Requirements Are Now in Effect

Since April 2025, version 4.0.1 of the PCI DSS standard has become the sole reference for all companies handling payment card data. Whether it involves processing, storing, or simply transmitting, the security of banking data has become a non-negotiable priority in a digital world that is more vulnerable than ever. The digital landscape of endless online payment transactions across various sectors.

Scattered Spider and DragonForce: A Case Study in Human-Centric Cyber Threats

In April 2025, Marks & Spencer, the Co-op Group, and Harrods were all targeted by cyber-attacks that caused disruption across their services. Although attribution is still being confirmed, indicators strongly link these attacks to Scattered Spider, a group known for aggressive, human-centric tactics and high-profile breaches. This post is not an incident breakdown for each retailer.

Chaining CVE-2024-38475 and CVE-2023-44221 for Full System Compromise

CVE-2024-38475 is a critical vulnerability in the Apache HTTP Server’s mod_rewrite module that permits arbitrary file read operations under specific configurations. This flaw arises from inadequate sanitization of user-controlled input passed to RewriteRule directives, which allows attackers to traverse the filesystem by manipulating server variables and regex capture groups.

RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)

On 5 May, 16:00 GMT+0, our automated malware analysis pipeline detected a suspicious package released, rand-user-agent@1.0.110. It detected unusual code in the package, and it wasn’t wrong. It detected signs of a supply chain attack against this legitimate package, which has about ~45.000 weekly downloads.