Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

A critical vulnerability affecting traffic light controllers made by SWARCO could have been exploited by hackers to disrupt a city’s traffic lights. [Read More]
Cisco has patched tens of vulnerabilities in its IOS software, including a dozen flaws affecting the company’s industrial routers and switches. [Read More]
Threat actors have targeted industrial suppliers in Japan and several European countries in sophisticated attacks that employed various techniques to make malware detection and analysis more difficult. [Read More]
Israel’s national cyber chief officially acknowledged the country had thwarted a major cyber attack last month against its water systems, an assault widely attributed to arch-enemy Iran. [Read More]
A Kaspersky researcher has identified several vulnerabilities in Emerson OpenEnterprise, a SCADA product designed for the oil and gas industry. [Read More]
Rockwell Automation has patched two vulnerabilities related to EDS files that can allow hackers to spread in a targeted organization’s OT network and compromise systems. [Read More]
Vulnerabilities discovered in Opto 22’s SoftPAC virtual controller expose OT networks to attacks, allowing attackers to disrupt services and execute malicious code. [Read More]
Siemens has informed customers that its low and high voltage power meters are affected by the Wind River VxWorks vulnerabilities dubbed Urgent/11. [Read More]
Cyber brings the opportunity of large-scale adversarial interference in food supplies, and all modern food plants face an ever-present consistent risk from cyber-attack. [Read More]
Researchers analyzed the possible entry points and attack vectors for targeting smart manufacturing systems and discovered several new vulnerabilities in the process. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.