<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>ARIA Cybersecurity Blog</title>
    <link>https://blog.ariacybersecurity.com/blog</link>
    <description />
    <language>en</language>
    <pubDate>Tue, 25 Nov 2025 13:45:11 GMT</pubDate>
    <dc:date>2025-11-25T13:45:11Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Cyberattacks on Water Facilities Are Growing | Aria Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/cyberattacks-on-water-facilities-are-growing</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/cyberattacks-on-water-facilities-are-growing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/ARIA_Water_Blog_FI.jpg" alt="Cyberattacks on Water Facilities Are Growing | Aria Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The water industry provides the drinking water and wastewater systems we all use every day. As such, it counts as a key piece of the nation’s critical infrastructure. But it is also in the crosshairs of a dangerous new wave of cyberattacks, originating from cyber criminals and hostile nation-states.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/cyberattacks-on-water-facilities-are-growing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/ARIA_Water_Blog_FI.jpg" alt="Cyberattacks on Water Facilities Are Growing | Aria Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The water industry provides the drinking water and wastewater systems we all use every day. As such, it counts as a key piece of the nation’s critical infrastructure. But it is also in the crosshairs of a dangerous new wave of cyberattacks, originating from cyber criminals and hostile nation-states.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fcyberattacks-on-water-facilities-are-growing&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <pubDate>Thu, 13 Mar 2025 15:18:19 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/cyberattacks-on-water-facilities-are-growing</guid>
      <dc:date>2025-03-13T15:18:19Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>Five 2025 New Year’s Resolutions for OT Cybersecurity Leaders | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/five-2025-new-years-resolutions-for-ot-cybersecurity-leaders-aria-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/five-2025-new-years-resolutions-for-ot-cybersecurity-leaders-aria-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/2025%20NYs%20IMG.jpg" alt="Five 2025 New Year’s Resolutions for OT Cybersecurity Leaders | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As we enter 2025, cybersecurity leaders in critical infrastructure industries—pharmaceuticals, manufacturing, and utilities—face the growing challenge of protecting operational technology (OT) environments against increasingly sophisticated cyberattacks. These critical industries are not only the backbone of our modern economies but also prime targets for a new wave of cybercriminals—some nation-state-backed actors—seeking to cause disruption, take down critical infrastructure, and extort their targets.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/five-2025-new-years-resolutions-for-ot-cybersecurity-leaders-aria-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/2025%20NYs%20IMG.jpg" alt="Five 2025 New Year’s Resolutions for OT Cybersecurity Leaders | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As we enter 2025, cybersecurity leaders in critical infrastructure industries—pharmaceuticals, manufacturing, and utilities—face the growing challenge of protecting operational technology (OT) environments against increasingly sophisticated cyberattacks. These critical industries are not only the backbone of our modern economies but also prime targets for a new wave of cybercriminals—some nation-state-backed actors—seeking to cause disruption, take down critical infrastructure, and extort their targets.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Ffive-2025-new-years-resolutions-for-ot-cybersecurity-leaders-aria-cybersecurity&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <pubDate>Mon, 27 Jan 2025 14:13:27 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/five-2025-new-years-resolutions-for-ot-cybersecurity-leaders-aria-cybersecurity</guid>
      <dc:date>2025-01-27T14:13:27Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>A Year in Cyberattacks - Lessons for Critical Infrastructure Security | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/a-year-in-cyberattacks-lessons-for-critical-infrastructure-security-aria-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/a-year-in-cyberattacks-lessons-for-critical-infrastructure-security-aria-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_594670361.jpg" alt="A Year in Cyberattacks - Lessons for Critical Infrastructure Security | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As industries such as utilities, manufacturing, and others grow increasingly reliant on operational technology (OT) to run their businesses, we’ve seen cyberattacks targeting these critical systems surge over the last year. We examined some of 2024’s more notable cybersecurity incidents impacting companies with critical infrastructure. We also explore how &lt;a href="https://www.ariacybersecurity.com/aria-azt-protect/"&gt;ARIA’s AZT PROTECT&lt;/a&gt;™ solution could have thwarted these attacks, providing a blueprint for safeguarding systems in this dangerous new era.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/a-year-in-cyberattacks-lessons-for-critical-infrastructure-security-aria-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_594670361.jpg" alt="A Year in Cyberattacks - Lessons for Critical Infrastructure Security | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As industries such as utilities, manufacturing, and others grow increasingly reliant on operational technology (OT) to run their businesses, we’ve seen cyberattacks targeting these critical systems surge over the last year. We examined some of 2024’s more notable cybersecurity incidents impacting companies with critical infrastructure. We also explore how &lt;a href="https://www.ariacybersecurity.com/aria-azt-protect/"&gt;ARIA’s AZT PROTECT&lt;/a&gt;™ solution could have thwarted these attacks, providing a blueprint for safeguarding systems in this dangerous new era.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fa-year-in-cyberattacks-lessons-for-critical-infrastructure-security-aria-cybersecurity&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <category>cybersecurity</category>
      <pubDate>Wed, 15 Jan 2025 14:22:23 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/a-year-in-cyberattacks-lessons-for-critical-infrastructure-security-aria-cybersecurity</guid>
      <dc:date>2025-01-15T14:22:23Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>How Should OT Companies Measure Cyber Risk? | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/how-should-ot-companies-measure-cyber-risk-and-how-can-they-reduce-the-dollar-impact-our-message-to-the-rockwell-ecosystem</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/how-should-ot-companies-measure-cyber-risk-and-how-can-they-reduce-the-dollar-impact-our-message-to-the-rockwell-ecosystem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/IMG_2473.jpg" alt="How Should OT Companies Measure Cyber Risk? | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The ARIA Cybersecurity team had a hugely productive week in Anaheim, California at the recent 2024 &lt;a href="https://www.rockwellautomation.com/en-us/events/automation-fair.html"&gt;Rockwell Automation Fair&lt;/a&gt;. The event was a fantastic opportunity to make connections with companies from across different industries. They all shared one objective: to discover innovative new ways to protect their industrial operations from the dangerous new wave of sophisticated cyberattacks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/how-should-ot-companies-measure-cyber-risk-and-how-can-they-reduce-the-dollar-impact-our-message-to-the-rockwell-ecosystem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/IMG_2473.jpg" alt="How Should OT Companies Measure Cyber Risk? | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The ARIA Cybersecurity team had a hugely productive week in Anaheim, California at the recent 2024 &lt;a href="https://www.rockwellautomation.com/en-us/events/automation-fair.html"&gt;Rockwell Automation Fair&lt;/a&gt;. The event was a fantastic opportunity to make connections with companies from across different industries. They all shared one objective: to discover innovative new ways to protect their industrial operations from the dangerous new wave of sophisticated cyberattacks.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fhow-should-ot-companies-measure-cyber-risk-and-how-can-they-reduce-the-dollar-impact-our-message-to-the-rockwell-ecosystem&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <pubDate>Wed, 11 Dec 2024 19:27:45 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/how-should-ot-companies-measure-cyber-risk-and-how-can-they-reduce-the-dollar-impact-our-message-to-the-rockwell-ecosystem</guid>
      <dc:date>2024-12-11T19:27:45Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>Critical Infrastructure is Under Attack - Next-Gen Zero Trust Can Help Protect</title>
      <link>https://blog.ariacybersecurity.com/blog/critical-infrastructure-is-under-attack-next-gen-zero-trust-can-help-protect</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/critical-infrastructure-is-under-attack-next-gen-zero-trust-can-help-protect" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_756874869.jpeg" alt="Critical Infrastructure is Under Attack - Next-Gen Zero Trust Can Help Protect" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The United States government is ramping up efforts to protect the nation’s critical infrastructure, providing guidance to both public and private sectors to strengthen their security and resilience over the next two years.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/critical-infrastructure-is-under-attack-next-gen-zero-trust-can-help-protect" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_756874869.jpeg" alt="Critical Infrastructure is Under Attack - Next-Gen Zero Trust Can Help Protect" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The United States government is ramping up efforts to protect the nation’s critical infrastructure, providing guidance to both public and private sectors to strengthen their security and resilience over the next two years.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fcritical-infrastructure-is-under-attack-next-gen-zero-trust-can-help-protect&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>data breach</category>
      <category>cybersecurity</category>
      <pubDate>Mon, 22 Jul 2024 14:58:10 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/critical-infrastructure-is-under-attack-next-gen-zero-trust-can-help-protect</guid>
      <dc:date>2024-07-22T14:58:10Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>ARIA’s and Rockwell Outline New Cybersecurity Approach | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/arias-and-rockwell-outline-new-cybersecurity-approach</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/arias-and-rockwell-outline-new-cybersecurity-approach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/Asset%203webinar_background.png" alt="ARIA’s and Rockwell Outline New Cybersecurity Approach | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;em&gt;ARIA and Rockwell detail how a global pharma giant is securing its production facilities using AZT PROTECT in new webinar &lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/arias-and-rockwell-outline-new-cybersecurity-approach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/Asset%203webinar_background.png" alt="ARIA’s and Rockwell Outline New Cybersecurity Approach | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;em&gt;ARIA and Rockwell detail how a global pharma giant is securing its production facilities using AZT PROTECT in new webinar &lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Farias-and-rockwell-outline-new-cybersecurity-approach&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <category>data breach</category>
      <category>data protection</category>
      <pubDate>Tue, 21 May 2024 18:49:24 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/arias-and-rockwell-outline-new-cybersecurity-approach</guid>
      <dc:date>2024-05-21T18:49:24Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>UnitedHealth Group’s Optum Subsidiary disrupted by Cyberattack | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/unitedhealth-groups-optum-subsidiary-disrupted-by-cyberattack</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/unitedhealth-groups-optum-subsidiary-disrupted-by-cyberattack" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/shutterstock_578912143.jpg" alt="UnitedHealth Group’s Optum Subsidiary disrupted by Cyberattack | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A major cyberattack has just hit the systems of a subsidiary of US health insurance giant, UnitedHealth. In an &lt;a href="https://www.sec.gov/ixviewer/ix.html?doc=/Archives/edgar/data/731766/000073176624000045/unh-20240221.htm"&gt;SEC filing,&lt;/a&gt; UnitedHealth said that it suspected a “nation-state associated cyber security threat actor” of gaining access to Change Healthcare, part of its Optum subsidiary and one of the largest prescription processors in the US, forcing it offline.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/unitedhealth-groups-optum-subsidiary-disrupted-by-cyberattack" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/shutterstock_578912143.jpg" alt="UnitedHealth Group’s Optum Subsidiary disrupted by Cyberattack | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A major cyberattack has just hit the systems of a subsidiary of US health insurance giant, UnitedHealth. In an &lt;a href="https://www.sec.gov/ixviewer/ix.html?doc=/Archives/edgar/data/731766/000073176624000045/unh-20240221.htm"&gt;SEC filing,&lt;/a&gt; UnitedHealth said that it suspected a “nation-state associated cyber security threat actor” of gaining access to Change Healthcare, part of its Optum subsidiary and one of the largest prescription processors in the US, forcing it offline.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Funitedhealth-groups-optum-subsidiary-disrupted-by-cyberattack&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <category>data breach</category>
      <category>cybersecurity</category>
      <category>data protection</category>
      <pubDate>Thu, 29 Feb 2024 12:38:38 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/unitedhealth-groups-optum-subsidiary-disrupted-by-cyberattack</guid>
      <dc:date>2024-02-29T12:38:38Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>How to Protect Against Supply-Chain Attacks | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/how-to-protect-against-supply-chain-attacks-aria-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/how-to-protect-against-supply-chain-attacks-aria-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_153083387.jpg" alt="AZT Agent Countermeasures to Detect and Blocks Execution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;SUNBURST (SolarWinds) – How ARIA would have stopped the supply-chain cyberattack of the decade – and others like it&lt;/h3&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/how-to-protect-against-supply-chain-attacks-aria-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_153083387.jpg" alt="AZT Agent Countermeasures to Detect and Blocks Execution" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;SUNBURST (SolarWinds) – How ARIA would have stopped the supply-chain cyberattack of the decade – and others like it&lt;/h3&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fhow-to-protect-against-supply-chain-attacks-aria-cybersecurity&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <category>cybersecurity</category>
      <pubDate>Mon, 05 Feb 2024 15:18:27 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/how-to-protect-against-supply-chain-attacks-aria-cybersecurity</guid>
      <dc:date>2024-02-05T15:18:27Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>Protecting OT From Unknown Vulnerably Exploits | ARIA Cybersecurity</title>
      <link>https://blog.ariacybersecurity.com/blog/protecting-ot-from-unknown-vulnerably-exploits</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/protecting-ot-from-unknown-vulnerably-exploits" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_288770892.jpg" alt="Protecting OT From Unknown Vulnerably Exploits | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The new generation of &lt;a href="https://www.ariacybersecurity.com/cybersecurity-products/solutions/"&gt;cybersecurity defenses&lt;/a&gt; must protect against never-seen-before attacks even before they are devised by the attackers. In early December 2023, a security researcher at SafeBreach presented a &lt;/span&gt;&lt;a href="https://www.blackhat.com/eu-23/briefings/schedule/index.html#the-pool-party-you-will-never-forget-new-process-injection-techniques-using-windows-thread-pools-35446"&gt;&lt;span&gt;paper&lt;/span&gt;&lt;/a&gt; (&lt;span style="font-style: italic; font-size: 14px;"&gt;Alon&amp;nbsp;Leviev&amp;nbsp;Security Researcher, SafeBreach - December 6,&amp;nbsp;2023&lt;/span&gt;&lt;span&gt;&lt;span style="font-style: italic; font-size: 14px;"&gt;&amp;nbsp;Blackhat UK&lt;/span&gt;)&lt;/span&gt;&lt;span&gt;&amp;nbsp;at &lt;/span&gt;&lt;a href="https://www.blackhat.com/eu-23"&gt;&lt;span&gt;BlackHat Europe&lt;/span&gt;&lt;/a&gt;&lt;span&gt; describing new process injection techniques utilizing Windows thread pools to attack a system. The researcher wanted to see if:&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/protecting-ot-from-unknown-vulnerably-exploits" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/AdobeStock_288770892.jpg" alt="Protecting OT From Unknown Vulnerably Exploits | ARIA Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The new generation of &lt;a href="https://www.ariacybersecurity.com/cybersecurity-products/solutions/"&gt;cybersecurity defenses&lt;/a&gt; must protect against never-seen-before attacks even before they are devised by the attackers. In early December 2023, a security researcher at SafeBreach presented a &lt;/span&gt;&lt;a href="https://www.blackhat.com/eu-23/briefings/schedule/index.html#the-pool-party-you-will-never-forget-new-process-injection-techniques-using-windows-thread-pools-35446"&gt;&lt;span&gt;paper&lt;/span&gt;&lt;/a&gt; (&lt;span style="font-style: italic; font-size: 14px;"&gt;Alon&amp;nbsp;Leviev&amp;nbsp;Security Researcher, SafeBreach - December 6,&amp;nbsp;2023&lt;/span&gt;&lt;span&gt;&lt;span style="font-style: italic; font-size: 14px;"&gt;&amp;nbsp;Blackhat UK&lt;/span&gt;)&lt;/span&gt;&lt;span&gt;&amp;nbsp;at &lt;/span&gt;&lt;a href="https://www.blackhat.com/eu-23"&gt;&lt;span&gt;BlackHat Europe&lt;/span&gt;&lt;/a&gt;&lt;span&gt; describing new process injection techniques utilizing Windows thread pools to attack a system. The researcher wanted to see if:&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fprotecting-ot-from-unknown-vulnerably-exploits&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <category>cybersecurity</category>
      <category>data protection</category>
      <pubDate>Wed, 31 Jan 2024 19:43:04 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/protecting-ot-from-unknown-vulnerably-exploits</guid>
      <dc:date>2024-01-31T19:43:04Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
    <item>
      <title>The SEC Just Got Serious About Cyber Incident Reporting | ARIA</title>
      <link>https://blog.ariacybersecurity.com/blog/sec-serious-about-cyber-incident-reporting</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/sec-serious-about-cyber-incident-reporting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/SEC_Blog_image.jpg" alt="The SEC Just Got Serious About Cyber Incident Reporting | ARIA" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: center;"&gt;&lt;strong&gt;&lt;em&gt;New SEC rules demand full disclosure of material cybersecurity incidents 4 days after they happen – are your OT security tools able to help stop “material” breaches? &lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.ariacybersecurity.com/blog/sec-serious-about-cyber-incident-reporting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.ariacybersecurity.com/hubfs/SEC_Blog_image.jpg" alt="The SEC Just Got Serious About Cyber Incident Reporting | ARIA" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: center;"&gt;&lt;strong&gt;&lt;em&gt;New SEC rules demand full disclosure of material cybersecurity incidents 4 days after they happen – are your OT security tools able to help stop “material” breaches? &lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=6120848&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.ariacybersecurity.com%2Fblog%2Fsec-serious-about-cyber-incident-reporting&amp;amp;bu=https%253A%252F%252Fblog.ariacybersecurity.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cyber attack</category>
      <category>data breach</category>
      <category>cybersecurity</category>
      <category>data protection</category>
      <pubDate>Thu, 14 Dec 2023 12:55:41 GMT</pubDate>
      <guid>https://blog.ariacybersecurity.com/blog/sec-serious-about-cyber-incident-reporting</guid>
      <dc:date>2023-12-14T12:55:41Z</dc:date>
      <dc:creator>ARIA Cybersecurity Solutions</dc:creator>
    </item>
  </channel>
</rss>
