Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybercriminals Want Your Backups - Here's How to Keep Them Safe

Cyber crime gets more advanced, and threat actors increasingly target backups with ransomware attacks. If an organization is left with erased or corrupted data and has no access to backup copies, there is no chance of recovery. This allows the attackers to demand ransom payments averaging at over 10 million dollars as of 2025. That is why your backup and disaster recovery strategy should be reliable and secure to keep your environments protected and guarantee business continuity.

KubeVirt installation on public cloud/upstream clusters

The default node pool VMs (worker nodes) in Azure do not have Intel virtualization extensions (VT-x) enabled. When trying to create a guest VM, you will see that the kubevirt VM pod will be unschedulable with the following error message: To fix this, you need to create a new node pool using an Azure VM flavor that has VT-x extensions. (those from the Ds_v3 series all have them)

Response to "Principles for the Secure Integration of Artificial Intelligence in OT"

This new guidance amounts to leading Western governments telling OT users (industrial businesses in manufacturing, energy, power, logistics, critical infrastructure, and the like), “Yes, you can use AI in OT, but only if you’re prepared for it to fail and you can recover quickly when it does.”

When cyberthreats meet the farm: Protecting OT in food and agriculture

The systems that grow, process and deliver our food operate in a world most of us never see: legacy equipment, air-gapped networks and decades-old operating systems quietly controlling the machinery that keeps supply chains moving. What happens when modern cyber threats collide with this aging infrastructure? The answer is more urgent than most people realize.

Lessons from the Jaguar Land Rover outage: How plant managers and OT engineers can prepare

Industrial plant managers and operational technology (OT) engineers have been closely following the August 2025 cyberattack on Jaguar Land Rover, which brought down its production lines for months and is expected to eventually cost the U.K. automaker billions of dollars in losses. It is a timely reminder that cybercriminals are actively targeting manufacturers and other industrial concerns that rely on OT, and merely the latest in a series of similar attacks, including.

AI at the inflection point: Reclaiming human creativity and productivity

Artificial intelligence is changing how businesses work and compete. In every corner of the market, organizations expect more productivity. The question facing today’s business leaders is no longer whether to embrace artificial intelligence but how to harness its full potential to drive meaningful and sustainable transformation.

How Small Businesses Can Outwit Cybercriminals on a Limited Budget

Cybercriminals don't care about the size of your business. They care about the size of the opening you leave them. Small businesses face the same threats as Fortune 500 companies but typically operate with a fraction of the resources. The stakes feel impossibly high when 60% of small businesses in a US Chamber of Commerce survey named cyberattacks as their top concern. However, the news isn't all grim. Data breach costs fell 9% globally last year as organizations improved their speed at spotting and stopping attacks, reports IBM.

Dharma (CrySiS) Ransomware: Technical Analysis, Context and Mitigation

Dharma, also known as CrySiS, is a long running ransomware family first observed in 2016. It operates as ransomware as a service, where developers lease the malware to affiliates who deploy it. A variant discovered in March 2021 appends the ".biden" extension to encrypted files. This article provides a technical analysis of Dharma, outlines its infection vector, describes its encryption workflow, and offers guidance for mitigation.

Why Acronis validation for Ignition is critical for OT resilience

Technology failures are inevitable in operational technology (OT) environments. While prevention is essential, the ability to recover quickly is what ultimately protects operations. When OT systems fail, production stops and the costs of reduced production, missed deliveries and possible regulatory problems immediately begin to accumulate. Manufacturers, utilities and industrial operators need to be able to get systems up and running again as rapidly as possible after an incident.