Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Fuji Electric updated its Monitouch V-SFT HMI software to address several vulnerabilities, including remote code execution flaws [Read More]
Exposed systems operated by Texas-based electrical engineering operator Power Quality Engineering (PQE) resulted in electrical infrastructure information of various clients being exposed to the Internet. [Read More]
Fuzzing tests conducted by Synopsys customers show industrial protocols are the least mature and the most risky [Read More]
Vulnerabilities found by a researcher in solar panels may allow hackers to disrupt power grids, but the affected vendor says his claims are greatly exaggerated [Read More]
Schneider Electric and industrial cybersecurity startup Claroty have teamed up to offer solutions for securing industrial infrastructure [Read More]
Siemens warns customers that some of its medical imaging products are exposed to attacks due to Windows vulnerabilities exploited in the wild [Read More]
A a group of senators has introduced bipartisan legislation to force vendors to ensure basic security within their IoT devices if they wish to sell into the government market. [Read More]
ICS-CERT and ZDI disclose details of critical vulnerabilities affecting Mitsubishi Electric’s E-Designer, a tool used to program E1000 HMIs [Read More]
ICS-CERT issues warning for a CAN bus vulnerability after researchers publish a PoC exploit for DoS attacks [Read More]
Researchers from China-based Tencent managed to remotely hack a Tesla Model X. The carmaker patched the flaws they exploited [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

David Holmes's picture
Don’t dismiss the IoT as just a consumer security problem. We have an opportunity to learn from the mistakes of the original Internet and build some security into the Internet of Things, if we act quickly.
Galina Antova's picture
The “red lines” that conventional wisdom once held would prevent disruptive or destructive attacks against critical infrastructure have now been crossed numerous times, and we can safely assume they will be again.
Barak Perelman's picture
Industrial organizations need early detection of suspicious activity like unauthorized network scans, attempts to read information from controllers and other unsanctioned control-plane activity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.
Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.
Barak Perelman's picture
While many companies are concerned about cyber threats to their operations, most do not understand the difference between data plane and control plane protocols.
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.