Latest

Revisiting Stuxnet, 15 years later

18 - June 2025

This week marks the 15th anniversary of Stuxnet’s discovery on 17 June 2010: the most well-known (and notorious) OT cyber-attack to disrupt physical equipment. With the target of the attack – ...

Level 0 Defense Against the Supply Chain Threat

11 - June 2025

Critical Infrastructure operators have long invested heavily in OT ...

OT Cyber Reporting

Why So Many OT Cyber Attacks Go Unreported. And Why That’s a Problem for

01 - June 2025

Most OT cyber threats that target critical infrastructure (power, water, ...

The 2025 OT Cyber Threat Report

19 - May 2025

The 2025 OT Cyber Threat Report: What It Tells Us (and What It Doesn’t ...

Rethinking Water Industry OT Cybersecurity Strategy

12 - May 2025

In crisis mode, the water industry needs to look beyond the obvious for ...

The Solution to High False Positives

06 - May 2025

Process-Oriented OT Cybersecurity: The Solution to High False Positives ...

Supply Chain Threats to Cyber Physical Systems

29 - April 2025

Supply Chain Threats to Cyber Physical Systems: The Case for ...

Layered Physical Cybersecurity for Resilient OT environments

21 - April 2025

Cybersecurity for industrial systems isn’t a new problem. But too ...

The Evolving Challenge of Industrial Cybersecurity

09 - April 2025

Cybersecurity for industrial systems isn’t a new problem. But too ...

NIS2: What It Is and Why It Matters for OT Cybersecurity

17 - March 2025

What is NIS2? The Network and Information Security Directive 2 ...

OT Cybersecurity Against Aurora Attacks

21 - January 2025

Protecting the Grid: How Process-Oriented OT Cybersecurity Defends ...

Process-Oriented Defense in OT Cybersecurity

15 - January 2025

The Future of OT Cybersecurity: Aligning with NIST IR with ...

KDSys Launches SigaML² in South Korea

23 - December 2024

KDSys Launches SigaML 2 , an Advanced Multi-Layer OT Cybersecurity Suite, ...

Why a Process-Oriented Approach is Essential?

02 - December 2024

The Big Picture: Operational Technology (OT) systems are now ...

101 Process-Oriented OT Cybersecurity

14 - November 2024

What is Process-Oriented OT Cybersecurity? When a cyberattack is ...

Nozomi Networks Expands OT Security with ARC Embedded Sensors

04 - November 2024

Nozomi Networks has announced its latest innovation: ARC Embedded - the ...

SIGA launching SigaML²

22 - October 2024

We’re thrilled to announce the launch of SigaML² , our innovative ...

From Ransomware Surges to Global Cyber Conflicts: 4 trends of Operational

10 - September 2024

In the ever-evolving landscape of industrial systems, the year 2024 ...

RAMBO Attack Targets Air-Gapped Systems via RAM

08 - September 2024

A new side-channel attack, dubbed RAMBO , can steal data from air-gapped ...

Cyber OT Alert Bulletin: Peach Sandstorm Deploys New Backdoor in Critical

29 - August 2024

Peach Sandstorm, a state-sponsored Iranian hacking group, has deployed a ...

SIGA recipient of the Cyber Excellence Awards 2024

09 - May 2024

We are thrilled to announce that our cybersecurity solutions have been ...

Stuxnet is Back! Or did it Ever Leave?

18 - March 2024

Unveiling the resurgence of Web-Based PLC malware and the imperative need ...

Navigating New OT Security Frontiers: SIGA and Radiflow

28 - February 2024

Yossi (Konstantin) Tarnopolsky, Director of Technology Alliances and APAC ...

SIGA Now Available in the Microsoft Azure Marketplace

19 - February 2024

Microsoft Azure customers worldwide now gain access to SIGA’s unique ...

New Horizons in Cybersecurity with SIGA

01 - February 2024

In an era where the landscape of cybersecurity is perpetually evolving, I ...

The Veolia Ransomware attack in early 2024

24 - January 2024

The recent ransomware attack on Veolia North America sheds light on the ...

4 Operational Technology (OT) Cybersecurity trends in 2024

03 - January 2024

In the ever-evolving landscape of industrial systems, the year 2024 ...

Critical Alert: Cyber threats to the U.S. Water Sector

17 - December 2023

In an unprecedented joint alert, the FBI, CISA, NSA, EPA, and INCD warn of ...

Safeguarding Against Cyber-Physical Threats: SIGA’s Level 0

22 - November 2023

In the wake of the recent cyber-physical attack on Ukraine's electrical ...

Four OT attack scenarios which require SIGA’s Level 0 detection

05 - September 2023

Attack Scenario 1: (Un)authorized Access Cyber menaces do not stem ...

Living-off-the-land (LOTL) attacks

21 - August 2023

Following the recent assault of the “Volt Typhoon” group on US ...

Level 0 recognized by NIST as a best-practice for OT cybersecurity

01 - May 2023

The National Institute of Standards and Technology (NIST) released a guide ...

SIGA @ Hannover Messe 2023

20 - March 2023

Come join SIGA during Hannover Messe 2023 (17-21 April)! Our VP Sales, ...

Manufacturing Application Brief

16 - February 2023

Manufacturing application brief

Ransomware in OT – keep your eyes on the ball!

11 - January 2023

OT vulnerabilities are here to stay. The security policies we thrive to ...

Securing Operational Technology (OT) systems

19 - December 2022

Frost and Sullivan together with Applied Risk have published an ...

Relentless cyber-attacks around the world

15 - December 2022

As cyber threats are growing ever-more intense and frequent, it's time for ...

SIGA @ INTECH 2022

04 - December 2022

SIGA participated at INTECH 2022, a leading industrial conference, ...

SIGA @ Energie report

24 - November 2022

ARES's CEO Jürgen Weiss spoke to the Energie Report  magazine and told ...

SIGA’s CRO, Amir Gil speaks at ICS 7th edition

20 - November 2022

SIGA's CRO, Amir Gil spoke at ICS 7th edition held on the 20th of ...

SIGA @ SPS 2022

10 - November 2022

SIGA participated at the Smart Production Solutions (SPS) conference in ...

SIGA’s CEO speaking at a major Water industry event

08 - November 2022

SIGA’s CEO, Amir Samoiloff attended a unique roundtable gathering water ...

SIGA IS THRILLED TO ANNOUNCE ITS PARTNERSHIP WITH CYWAY

08 - September 2022

Cyway  is a Dubai-based emerging leader in value-add cybersecurity ...

CRITICAL INFRASTRUCTURE SECURITY SHOWDOWN (CISS) – RESULTS

01 - September 2022

SHIELDS-UP

08 - May 2022

In light of the waging Russian war on Ukraine over the past two months and ...

THE NOTORIOUS PIPEDREAM MALWARE

30 - April 2022

A new advisory based on a joint federal and private sector investigation ...

ROCKWELL PLCS VULNERABILITIES YET TO FURTHER EMPHASIZE THE IMPORTANCE OF

14 - April 2022

A new advisory based on a joint federal and private sector investigation ...

“THE NEXT EVOLUTION OF OT CYBER SECURITY”

08 - April 2022

A new advisory based on a joint federal and private sector investigation ...

PARALLEL REFERENCE MONITORING

03 - March 2021

HMI’s Can be Fooled! Detect anomalies before they damage your critical ...

THE ATTACK ON U.S. CYBERSECURITY FIRM FIREEYE AND THE SOLUTION

10 - December 2020

YESTERDAY, DEC. 08 TH ,  IT WAS ANNOUNCED THAT AN  UNPRECEDENTED ...

SIGA IS PARTICIPATING IN THE ‘SWEDEN INNOVATION DAYS’

17 - October 2020

NOW, October 17th -19th, SIGA is taking part in a three-day worldwide ...

NEW REGULATORY FRAMEWORK BY ISRAEL MINISTRY OF ENVIRONMENTAL –

15 - September 2020

Highlights the significance of Cybersecurity Monitoring at ICS ...

SUBSCRIBE

    CATEGORIES