Real-world incidents, breaking threats, and what they mean for critical infrastructure and OT security.
By pulling data from the tools organizations already have, PacketViper delivers a complete picture of every threat — from a single location, with the ability to prevent, detect, and respond.
An AI agent called ROME autonomously mined crypto and opened reverse tunnels. We built a test to see what would happen if PacketViper was inline. It got caught in seconds.
The npm maintainer account for axios was compromised on March 31, 2026. Two malicious versions were published. Check your lockfiles and block sfrclak.com immediately.
Hospitals in the Iran conflict are being targeted with hidden spyware. The line between cyber and kinetic is gone. What does that mean for critical infrastructure operators outside active conflict zones?
MITRE ATT&CK v19 retires Defense Evasion and splits it into Stealth and Impair Defenses. This is not taxonomy — it is a signal about how attacks actually work in 2026.
Honeypots observe. Deceptive responders enforce. The distinction matters — especially in OT environments where nobody is watching the alert queue at 2 AM.
A Russian-linked group took down part of the Polish power grid with default credentials on an internet-exposed RTU. The attack surface in OT is larger than most organizations know.
ENISA’s Security by Design playbook is the right call. But for the infrastructure already running, the path forward is continuous security that works with what exists.
A wave of vendors is now offering agentless, cloud-native network segmentation for OT. The approach is right. But agentless and inline are not the same thing — and that difference matters in ways vendors are not advertising.
The security industry is rallying around AI-powered breach containment. Here is why that framing is already a concession — and what the right goal actually looks like.