Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

GandCrab, once known as a consumer-targeting ransomware, is increasingly being used in attacks against business organizations [Read More]
Several vulnerabilities discovered by a researcher in GE software used for power meters, including hardcoded credentials and privilege escalation flaws. [Read More]
The TSA doesn't have a strategic workforce plan to help ensure it identifies the skills and competencies—such as the required level of cybersecurity expertise—necessary to carry out its pipeline security responsibilities, a GAO report shows. [Read More]
A denial-of-service (DoS) attack has been blamed for disrupting US electrical grid operations in the Western region. [Read More]
Two vulnerabilities discovered by CyberX and Nozomi in Rockwell Automation controllers expose devices to DoS attacks. [Read More]
Cisco Talos researchers find nearly a dozen vulnerabilities in Sierra Wireless AirLink gateways and routers, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. [Read More]
NIST updates its ACTS toolkit to help developers of safety-critical applications, such as the ones powering aircraft and nuclear power plants, find errors and make their software safer. [Read More]
Swiss-based special-purpose vehicle maker Aebi Schmidt confirms being hit by a piece of malware and says the incident may result in disruptions to business operations. [Read More]
A serious vulnerability in some of Rockwell Automation’s MicroLogix and CompactLogix PLCs allows a remote, unauthenticated attacker to redirect users to malicious websites. [Read More]
Researchers demonstrate an interesting type of DoS attack on PLCs, where network flooding can lead to the disruption of the physical process controlled by the device. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.