A few months ago, I acquired several AI accelerators – Habana Labs Goya, the first...
Read MoreWhen Availability is top priority
IT and OT Cyber Security
Although IT (Information Technology) and OT (Operational Technology) originate from distinct domains, their convergence is becoming increasingly evident. As industrial environments become more connected, the boundaries between these two worlds are blurring — introducing new cybersecurity challenges. Bridging IT and OT security is essential to ensure operational continuity, data integrity, and protection against emerging threats targeting critical infrastructure.
OT Security
Advanced OT Cyber Security Solutions for Industrial Environments
In the realm of Operational Technology, where industrial processes and critical infrastructures intersect, ensuring the security and continuity of operations is paramount. Our specialized OT cybersecurity services are designed to protect your industrial systems, machinery, and processes from cyber threats, allowing you to focus on driving efficiency and innovation.
IT Security
Comprehensive IT Cyber Security Services
In today’s digital age, safeguarding sensitive data and ensuring the uninterrupted operation of your business is paramount. Our IT cybersecurity services are tailored to protect your organization from evolving cyber threats, providing robust defenses and peace of mind.
We are part of the CYB3R ALLIANCE
Our Blog
Check our latest articles about IT, OT and Cyber Security
Building the Perfect AI Cluster: A Chassis Challenge
Recently, I was diving into a project focused on building a custom AI cluster, which...
Read MoreIs Governance in OT Necessary? InfraSec 2025
📅 It’s March, and the excitement from the 9th edition of #InfraSECForum2025 🛡️ has settled,...
Read MoreIntel Xeon PHI 7220p – Forgotten Accelerator
A Journey Through Exotic Systems and Hardware It’s no secret that I enjoy exploring exotic...
Read MoreFollow the latest Cyber Security news
Stay ahead with real-time updates, expert insights, and critical threat intelligence.
- CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including three flaws impacting Cisco Catalyst SD-WAN Manager, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2023-27351 (CVSS score: 8.2) - An improper authentication vulnerability in PaperCut
- SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
A critical security vulnerability has been disclosed in SGLang that, if successfully exploited, could result in remote code execution on susceptible systems. The vulnerability, tracked as CVE-2026-5760, carries a CVSS score of 9.8 out of 10.0. It has been described as a case of command injection leading to the execution of arbitrary code. SGLang is a high-performance, open-source serving
- ⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
Monday’s recap shows the same pattern in different places. A third-party tool becomes a way in, then leads to internal access. A trusted download path is briefly swapped to deliver malware. Browser extensions act normally while pulling data and running code. Even update channels are used to push payloads. It’s not breaking systems—it’s bending trust. There’s also a shift in how attacks run.
- Why Most AI Deployments Stall After the Demo
The fastest way to fall in love with an AI tool is to watch the demo. Everything moves quickly. Prompts land cleanly. The system produces impressive outputs in seconds. It feels like the beginning of a new era for your team. But most AI initiatives don't fail because of bad technology. They stall because what worked in the demo doesn't survive contact with real operations. The gap between a
- Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain. "This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to
- Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems
Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be specifically designed to target Israeli water treatment and desalination systems. The malware has been codenamed ZionSiphon by Darktrace, highlighting its ability to set up persistence, tamper with local configuration files, and scan for operational technology (OT)-relevant services on the local subnet.
Reduce the Cyber Risk in your Company






