kkostreva@guardsight.com

About Katherine Kostreva

This author has not yet filled in any details.
So far Katherine Kostreva has created 184 blog entries.
Critical Infrastructure: Understanding Cybersecurity Threats to Water and Wastewater Treatment Facilities

Critical Infrastructure: Understanding Cybersecurity Threats to Water and Wastewater Treatment Facilities

2024-02-27T22:20:57+00:00

The security of critical infrastructure has become a paramount concern in an age where digital connectivity pervades every aspect of society. Among the most crucial elements of infrastructure are water and wastewater treatment facilities, which are essential for public health, environmental protection, and economic stability. However, these facilities are increasingly becoming targets for cybersecurity attacks, posing significant risks to communities and nations worldwide. The Vulnerability of Water and Wastewater Treatment Facilities Water and wastewater ... Read More

Critical Infrastructure: Understanding Cybersecurity Threats to Water and Wastewater Treatment Facilities2024-02-27T22:20:57+00:00

GSPBC-1082 – Reconnaissance – Gather Victim Network Information

2024-02-27T21:20:59+00:00

Gather Victim Network Information Adversaries may gather information about the victim's networks that can be used during targeting. Information about networks may include a variety of details, including administrative data (ex: IP ranges, domain names, etc.) as well as specifics regarding its topology and operations. Adversaries may gather this information in various ways, such as direct collection actions via Active Scanning or Phishing for Information. Information about networks may also be exposed to adversaries via online ... Read More

GSPBC-1082 – Reconnaissance – Gather Victim Network Information2024-02-27T21:20:59+00:00
GSPBC-1081 - Impact - Endpoint Denial of Service

GSPBC-1081 – Impact – Endpoint Denial of Service

2024-02-15T22:48:17+00:00

Endpoint Denial of Service Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applications. Adversaries have been observed conducting DoS attacks for political purposes and to support other malicious activities, including distraction, ... Read More

GSPBC-1081 – Impact – Endpoint Denial of Service2024-02-15T22:48:17+00:00

TomCast LXXIV: Water and Wastewater Security

2024-02-15T20:43:31+00:00

Tom: Hello and welcome back to this next TomCast from Iron Bow Technologies. We are a tactical cybersecurity as a service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today we're going to discuss a portion of critical infrastructure, namely water and wastewater treatment facilities. Joining us in this discussion is Iron Bow's own Dr. Barry Wood. Welcome, Barry. Barry: Thank you. It's good to be here. Tom: ... Read More

TomCast LXXIV: Water and Wastewater Security2024-02-15T20:43:31+00:00

TomCast LXXIII: Artificial Intelligence

2024-02-01T01:20:05+00:00

Hello, and welcome back to this next TomCast from Iron Bow Technologies; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints. Today we’re going to discuss the hot topic of artificial intelligence. Now, since TomCast’s are usually between 3 and 5 minutes long, there is absolutely no way I can get all the way through a comprehensive talk on what artificial intelligence is, what ... Read More

TomCast LXXIII: Artificial Intelligence2024-02-01T01:20:05+00:00

TomCast LXXII: Botnets

2024-02-01T01:01:46+00:00

Hello, and welcome back to this next TomCast from Iron Bow Technologies; we are a tactical cybersecurity-as-a-service organization dedicated to helping businesses protect their data, their assets, and their endpoints.  Today we’re going to discuss the awareness of cyber ignorance. While this may initially come across as a rant, that is not the intent. The purpose of this discussion is to provide some guidance on how to reach individuals or organizations that just ... Read More

TomCast LXXII: Botnets2024-02-01T01:01:46+00:00

Network Denial of Service (DoS) Attacks: Understanding, Mitigation, and Solutions

2024-01-31T23:42:31+00:00

Network Denial of Service (DoS) attacks have become an increasingly prevalent threat in the cybersecurity landscape. As technology advances, so do the methods used by malicious actors to disrupt services and compromise system availability. In this article, we will delve into the intricacies of DoS attacks, exploring their nature, motives, techniques, primary targets, and advanced solutions for prevention and mitigation. Additionally, we will highlight the role of outsourcing, particularly through specialized organizations like GuardSight, ... Read More

Network Denial of Service (DoS) Attacks: Understanding, Mitigation, and Solutions2024-01-31T23:42:31+00:00