ICS/SCADA
How critical infrastructure operators rate their security controls
Indegy revealed that nearly 60 percent of executives at critical infrastructure operators polled in a recent survey said they lack appropriate controls to protect their …
Keeping on top of ICS-focused hacking groups, defenses
How many hacking groups are focusing on ICS systems? Dragos security researchers say at least five were active in 2017. “While only one has demonstrated an apparent …
UK cyber risk picture: Emergency services at risk of a major cyber attack
The UK’s emergency services are at risk of a major cyber-attack. This is the finding of a new landscape analysis, issued by intelligence provider Anomali. The UK Threat …
Expected changes in IT/OT convergence and industrial security
Ten years ago, I was brought into the industrial security arena by a top company executive in who was convinced that we needed traditional endpoint protection on smart meters. …
US sets up dedicated office for energy infrastructure cybersecurity
The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on …
When crypto-mining malware hits a SCADA network
Stealthy crypto-mining is on track to surpass ransomware as cybercriminals’ most favorite money-making option, and companies with computers and servers that run all day …
Number of Internet-accessible ICS components is increasing every year
The number of industrial control system (ICS) components – which run factories, transport, power plants and other facilities – left open to Internet access, is …
Strong security simplifies compliance for French operators of vital industry
In 2014, France’s National Agency for the Security of Information Systems, or ANSSI, issued two detailed cybersecurity guidance documents for Industrial Control Systems: …
Researchers uncover major security vulnerabilities in ICS mobile applications
IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems. Proof-of-concept Attack on Victim HMI …
Attackers disrupt plant operations with ICS-tailored malware
Security researchers from FireEye and Dragos have analyzed and detailed a new piece of malware targeting industrial control systems (ICS). Dubbed “TRITON” and …
Sophisticated industrial network monitoring without connectivity risks
SecurityMatters and Waterfall Security Solutions announced a global partnership to protect industrial control systems from the most advanced cyber threats. The joint solution …
Data-driven analysis of vulnerabilities in real-world OT networks
Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and …
Featured news
Resources
Don't miss
- European companies hit with effective DocuSign-themed phishing emails
- BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
- CISO accountability: Navigating a landscape of responsibility
- Key steps to scaling automated compliance while maintaining security
- Vanir: Open-source security patch validation for Android