Security Experts:

long dotted


Cisco Talos researchers have identified a critical remote code execution vulnerability in the CODESYS Control SoftPLC industrial controller software. [Read More]
Researchers have found another vulnerability in Schneider Electric software that is similar to the one exploited by the notorious Stuxnet malware. [Read More]
President Donald Trump has signed an executive order prohibiting the acquisition of bulk-power system equipment that could contain intentional backdoors planted by adversaries. [Read More]
The changes made to PLCs in the attacks targeting Israeli water facilities shows the sophistication of the hackers and that they knew exactly what they were doing. [Read More]
Researchers say a critical DoS vulnerability they discovered in Inductive Automation’s Ignition Gateway could allow hackers to cause disruption on the plant floor. [Read More]
The Israeli government has alerted organizations in the water sector following a series of cyberattacks aimed at SCADA systems. [Read More]
Several serious vulnerabilities have been found in the ABB 800xA DCS, including flaws that can be exploited to cause disruption in industrial environments. [Read More]
Hackers impersonated Egyptian state oil company Enppi in attempt to infect oil and gas companies with the "Agent Tesla" spyware Trojan. [Read More]
Starbleed is a newly disclosed vulnerability in FPGA chips that can expose many mission- and safety-critical devices to attacks. [Read More]
A threat actor that has been spotted targeting Azerbaijan has shown an interest in the energy sector, specifically SCADA systems related to wind turbines. [Read More]


rss icon

Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.