Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

A graphical user interface (GUI) is now available for Kamerka, the open source reconnaissance tool that can be used to identify internet-exposed ICS and IoT systems. [Read More]
More details have emerged on the March cyberattack on a U.S. power utility: the victim was renewable energy provider sPower and the attackers exploited a vulnerability in Cisco firewalls. [Read More]
India’s largest nuclear power plant was reportedly hit by a piece of malware that has been linked to North Korean hackers. [Read More]
Two critical authentication-related vulnerabilities have been found by researchers in a chiller made by Germany-based Rittal for cooling IT applications. [Read More]
Some of the recent cybersecurity incidents involving industrial control systems (ICS) have resulted in injury and even loss of life, according to a survey. [Read More]
Several major tech and cybersecurity firms launch the Operational Technology Cyber Security Alliance (OTCSA), which aims to help organizations address OT security challenges. [Read More]
Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]
Cisco Talos researchers have discovered nearly a dozen vulnerabilities, including potentially serious flaws, in Schneider Electric Modicon programmable logic controllers. [Read More]
A survey of over 1,700 individuals in the utilities sector shows that 56% have reported at least one shutdown or operational data loss, and 54% expect an attack on critical infrastructure in the next year. [Read More]
A couple of vulnerabilities affecting the TwinCAT PLC runtime from Beckhoff can be exploited for DoS attacks, which may be triggered by malicious actors or by accident. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.