A few months ago, I acquired several AI accelerators – Habana Labs Goya, the first...
Read MoreWhen Availability is top priority
IT and OT Cyber Security
Although IT (Information Technology) and OT (Operational Technology) originate from distinct domains, their convergence is becoming increasingly evident. As industrial environments become more connected, the boundaries between these two worlds are blurring — introducing new cybersecurity challenges. Bridging IT and OT security is essential to ensure operational continuity, data integrity, and protection against emerging threats targeting critical infrastructure.
OT Security
Advanced OT Cyber Security Solutions for Industrial Environments
In the realm of Operational Technology, where industrial processes and critical infrastructures intersect, ensuring the security and continuity of operations is paramount. Our specialized OT cybersecurity services are designed to protect your industrial systems, machinery, and processes from cyber threats, allowing you to focus on driving efficiency and innovation.
IT Security
Comprehensive IT Cyber Security Services
In today’s digital age, safeguarding sensitive data and ensuring the uninterrupted operation of your business is paramount. Our IT cybersecurity services are tailored to protect your organization from evolving cyber threats, providing robust defenses and peace of mind.
We are part of the CYB3R ALLIANCE
Our Blog
Check our latest articles about IT, OT and Cyber Security
Building the Perfect AI Cluster: A Chassis Challenge
Recently, I was diving into a project focused on building a custom AI cluster, which...
Read MoreIs Governance in OT Necessary? InfraSec 2025
📅 It’s March, and the excitement from the 9th edition of #InfraSECForum2025 🛡️ has settled,...
Read MoreIntel Xeon PHI 7220p – Forgotten Accelerator
A Journey Through Exotic Systems and Hardware It’s no secret that I enjoy exploring exotic...
Read MoreFollow the latest Cyber Security news
Stay ahead with real-time updates, expert insights, and critical threat intelligence.
- DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
The information technology (IT) workers associated with the Democratic People's Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they're impersonating, marking a new escalation of the fraudulent scheme. "These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent
- Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in bring your own vulnerable driver (BYOVD) component for defense evasion purposes within the ransomware payload itself. BYOVD refers to an adversarial technique that abuses legitimate but flawed driver software to escalate privileges and disable Endpoint Detection
- From Ransomware to Residency: Inside the Rise of the Digital Parasite
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated on noise while missing a more dangerous shift happening quietly all around them? According to Picus Labs’ new Red Report 2026, which analyzed over 1.1 million malicious files and mapped 15.5 million adversarial actions observed across 2025, attackers are no longer optimizing for
- Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0. "An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may
- ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security
January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A funding round. This investment came from the well-known investment firm Hillhouse Capital, bringing ZAST.AI's total funding close to $10 million. This marks a recognition from leading capital markets of a new solution: ending the era of high false positive rates in security tools and making every alert
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance. The incident took place on January 29, 2026, when a mail server that was not updated to the latest version was compromised, the company's Chief Commercial Officer, Derek Curtis, said. "Prior to the breach, we had approximately 30 servers/VMs
Reduce the Cyber Risk in your Company






