Blog

Supply Chain Attacks and their impact on OT/ICS Cybersecurity

Supply Chain Attacks and their impact on OT/ICS Cybersecurity   Solarwinds and other supply chain attacks are the initial attack vector on organizations – the first link in a sequence of steps to achieve control and disruption. How can industrial networks be protected?   Described by Microsoft’s President Brad Smith as the world’s largest and …

Supply Chain Attacks and their impact on OT/ICS Cybersecurity Read More »

Oldsmar Water Treatment

Lessons Learned from the Oldsmar Water Treatment Cyber attack

Lessons learned from the Oldsmar water supply cyberattack Hacked: The water treatment facility in Oldsmar, FL According to a cybersecurity advisory issued jointly last Thursday (2/11) by the FBI, CISA, UEPA and the Multi State ISAC, unidentified cyber actors had obtained unauthorized access to the supervisory control and data acquisition (SCADA) of a  U.S. drinking water …

Lessons Learned from the Oldsmar Water Treatment Cyber attack Read More »

GateScanner – Salesforce connector brings data security to the cloud

GateScanner-Salesforce connector brings CDR data security to the cloud Sasa Software teamed up with Assuta Medical Centers, Israel’s largest private medical services provider, and Deloitte Digital, the world’s leading professional services firm, to deliver a seamless SaaS-based integration between Salesforce CRM and GateScanner CDR, with a transparent user experience.GateScanner® Content Disarm and Reconstruction (CDR) connector …

GateScanner – Salesforce connector brings data security to the cloud Read More »

GateScanner by Sasa Software

Avoiding Adrozek and other browser-modifier malware

Microsoft Security Research Team has recently reported (December 10) that a browser modifier malware they have named Adrozek has been widely observed in recent months. This malware affects multiple browsers, including Chrome, Edge, Firefox and Yandex Browser. The mechanism of attack is modifying browser settings and DLL files to result in injection of unauthorized ads …

Avoiding Adrozek and other browser-modifier malware Read More »

GateScanner by Sasa Software

Emotet Campaign

Emotet Campaign – Guidance to GateScanner Users Emotet, one of the most famous and dangerous Trojans, has lately been spotted as a part of a mass phishing campaign. The campaign consists of an email which includes a Microsoft Office doc that when clicked gives an Office 365 error message, generated by an obfuscated macro script. The …

Emotet Campaign Read More »

GateScanner by Sasa Software

סאסא סופטוור – מהקיבוץ להגנת סייבר בעולם

  מתקפת הסייבר על חברת הביטוח שירביט מצטרפת לגל גואה של מתקפות על ארגונים בארץ ובעולם המצביע על שינוי בדפוסי הפעולה של התוקפים. אם בעבר מתקפות היו “שקטות”, הדפוס שרואים כיום הוא התבססות של התוקפים ותכנון שעת “שין” ליצירת נזק תפעולי ותדמיתי נרחב באמצעות מתקפה רב-שלבית. שימוש במערכות הלבנה נפוץ מזה שנים רבות בישראל, וכעת …

סאסא סופטוור – מהקיבוץ להגנת סייבר בעולם Read More »

Tackling Qbot and preventing ransomware attacks

The infamous Qbot banking trojan has recently been spotted again, infecting tens of thousands of machines to date, mainly in the US Also known as Quakbot, QakBot and Pinkslipbot, the Qbot trojan is a highly-maintained malware, with sophisticated evasion and persistence capabilities, and equipped with a worm-like functionality enabling it to spread quickly through networks. …

Tackling Qbot and preventing ransomware attacks Read More »

Sasa Software named “Cool Vendor” by Gartner

Sasa Software named “Cool Vendor” by Gartner, in Cyber-Physical Systems (CPS) Security report 2020. Analyst firm Gartner recently published the “Cool Vendors in Cyber-Physical Systems Security” (CPS) [1] naming Sasa Software in the report.  This adds to a previous publication, “Market Guide for Operational Technology Security” [2], identifying Sasa Software in the OT Endpoints Security …

Sasa Software named “Cool Vendor” by Gartner Read More »

GateScanner by Sasa Software

Sasa Software Partners with SentinelOne to Offer NextGen AI-driven Security

Sasa Software Partners with SentinelOne to Offer NextGen AI-driven Security First published on SentinelOne blog Content Disarm and Reconstruction (CDR) is designed to provide a safe, hassle-free solution for the prevention of file-based attacks.  Instead of relying on signature-based scanning or sandbox behavioral analysis, the technology breaks the file into its components, and then re-creates …

Sasa Software Partners with SentinelOne to Offer NextGen AI-driven Security Read More »

Securing portable media

Portable Media (USB) and NERC CIP Compliance

Industrial systems are under continuous threats- according to a recent study, Half of industrial control system networks have faced cyberattacks in the past year, and removable media (portable media) is identified as the second most common threats to these networks. The cyber threats emanating from USB devices are well documented…

GateScanner CDR Mail – Password Protected Attachments

In this video we’ll discuss a how GateScanner Mail CDR processes password protected attachments. Adding a password to files encrypts them, creating a challenge to scanning and detection technologies and opening a route of attack. GateScanner Mail CDR solves this with a unique capability for the user to securely provide the password for the file.

DICOM (Digital Imaging and Communications in Medicine) is a ticking bomb in healthcare – updated for the COVID-19 pandemic

Updated in view of the COVID-19 pandemic (Feb-Mar 2020) Medical imaging results saved in DICOM files is emerging to be an acute healthcare vulnerability.  Patients continually undergo medical imaging tests, but during the COVID-19 pandemic there is a requirement to limit patient access to clinics.  Furthermore, once a patient undergoes the evaluation, there are scenarios …

DICOM (Digital Imaging and Communications in Medicine) is a ticking bomb in healthcare – updated for the COVID-19 pandemic Read More »

GateScanner by Sasa Software

Sasa Software’s GateScanner successfully blocks ransomware attacks on Assuta Medical Centers

Sasa Software’s GateScanner solution successfully blocks ransomware attacks on Assuta Medical Centers March 1, 2017 Sasa Software’s security solutions, designed for the medical sector, have successfully prevented attacks on the Assuta hospital network. Among other things, sophisticated and unrecognized ransomware attacks were successfully blocked. Assuta – Medical Centers, the largest network of hospitals and medical …

Sasa Software’s GateScanner successfully blocks ransomware attacks on Assuta Medical Centers Read More »

Scroll to Top