Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Swiss industrial tech company ABB has patched a dozen vulnerabilities, including serious issues, in some of its HMI products. [Read More]
Several vulnerabilities affecting the Phoenix Contact Automationworx automation software suite can be exploited for remote code execution using specially crafted project files. [Read More]
Indegy announces general availability of CIRRUS, an industrial cybersecurity-as-a-service (ICSaaS) offering. [Read More]
The Kremlin on Tuesday said Moscow had been the victim of US cyberattacks "for years" following a New York Times report that Washington is stepping up digital incursions into Russia's power grid. [Read More]
The New York Times reports that the US has planted potentially destructive malware in Russia’s power grid, but President Trump says the story is not true and calls it a “virtual act of treason.” [Read More]
Xenotime, the threat actor behind the 2017 Trisis/Triton malware attack, is now targeting — in addition to oil and gas organizations — electric utilities in the United States and the APAC region. [Read More]
Several serious vulnerabilities have been found by a researcher in WAGO 852 industrial managed switches. [Read More]
Organizations have been investing more in ICS cyber security and the results are showing, but many still rate their overall risk profile as severe or high, according to the SANS 2019 State of OT/ICS Cybersecurity Report. [Read More]
An open source tool named Kamerka allows users to generate a map of Internet-exposed ICS devices in a specified country and link results to Google Street View. [Read More]
A critical vulnerability has been found in oil tank monitoring devices from Tecson, but the vendor has released a patch and notes that there are less than 1,000 devices that could be affected. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.