Archive

Aligning Cybersecurity and Third-Party Risk Management with Business Goals

March 25, 2025 In the cybersecurity risk world, we often encounter the issue of not speaking the same language as the business.

Rethinking Risk: ICS & OT Security with Purdue 2.0 and GRC

March 18, 2025 The rise of the extended Internet of Things (XIoT) across industrial (IIoT), healthcare (IoMT), commercial (OT, BMS/EMS/ACS/iBAS/FMS), and other sectors has brought remarkable efficienc…

Fortifying OT/ICS: Building Resilience and Business Continuity in a Cyber Threat Era

March 11, 2025 Without solid governance, organizations cannot effectively manage compliance or mitigate risks.

Breaking Basta: Insights from Black Basta’s Leaked Ransomware Chats

March 6, 2025 Key Takeaways During the period covered by the Black Basta leaked chat logs (18 September 2023 – 28 September 2024), we observed the following We observed at least 47 cryptocurrency wa…

Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear

March 4, 2025 In early March 2025, GRIT received reports from multiple organizations regarding suspicious physical letters delivered by mail from US addresses to members of their executive team.

Proactive Security: Navigating HIPAA’s Proposed Risk Analysis Updates

March 4, 2025 NOTE:  This article discusses proposed changes to existing regulations.

Untangling AWS Networks with Cloud WAN

February 25, 2025 As organizations grow so does their infrastructure, often without a well-designed underlying infrastructure to support this growth.

GRIT’s 2025 Report: Ransomware Group Dynamics and Case Studies

February 18, 2025 Ransomware threats continue evolving, with the most successful groups refining their tactics to maximize impact over the last year.

GRIT’s 2025 Report: Annual Vulnerability Analysis and Exploitation Trends

February 4, 2025 2024 saw an unprecedented surge in vulnerability disclosures, with over 39,000 vulnerabilities published.

Ongoing report: Babuk2 (Babuk-Bjorka)

January 29, 2025 Editor’s note: We will continue to provide updates as further information is forthcoming.

GRIT’s 2025 Report: Post-Compromise Detection Strategies

January 28, 2025 This blog marks the beginning of a series based on the findings in the GRIT 2025 Ransomware and Cyber Threat Report.

OT/ICS Security: Beyond the Easy Button

January 23, 2025 In the world of Operational Technology (OT) and Industrial Control Systems (ICS), security cannot rely on a “set it and forget it” mindset or an over-reliance on the lates…