Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Firmware validation bypass vulnerabilities allow ransomware and other attacks against SCADA devices that are less likely to pose a risk [Read More]
Vulnerabilities in Hyundai remote access app allowed hackers to locate, unlock and start a targeted vehicle [Read More]
New variants of a recently discovered BrickerBot Internet of Things (IoT) malware capable of permanently disabling devices were observed last week, Radware security researchers warn. [Read More]
Moxa addresses hardcoded credentials issue that can be exploited by attackers to gain complete control of the company’s APs [Read More]
The new Hajime IoT worm appears to be the work of a white hat hacker attempting to take control of IoT devices from Mirai botnet and other threats, Symantec says. [Read More]
Houston, TX-based PAS has taken a $40 Million investment that will be used to fuel its Industrial control system (ICS) cybersecurity business. [Read More]
Cisco Talos researchers identified over a dozen vulnerabilities in Moxa industrial wireless access points (APs) as part of a two-week analysis of the product [Read More]
Hundreds of thousands of IIoT and ICS products could be exposed to attacks due to critical vulnerabilities affecting a widely used CODESYS framework [Read More]
Modbus-related Implementation flaws allow attackers to execute arbitrary commands on controllers from several vendors [Read More]
Researchers disclose unpatched vulnerabilities in Schneider Electric PLCs. Vendor admits dropping the ball in communicating with the experts [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
While many companies are concerned about cyber threats to their operations, most do not understand the difference between data plane and control plane protocols.
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Barak Perelman's picture
To protect against external threats, malicious insiders and human error, industrial organizations must monitor all activities - whether executed by an unknown source or a trusted insider.
Barak Perelman's picture
The single biggest roadblock to ICS security today is the lack the visibility and control into activity that is occurring at the control layer, namely access and changes made to industrial control devices.
Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.
Johnnie Konstantas's picture
To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.
Tim Layton's picture
Based on existing intelligence, it is reasonable to assume that nation-states already possess all the information they need to launch such an attack on the U.S. power grid.
Jim Ivers's picture
What is missing from the conversation is how large a role software plays in the IoT equation. Plugging something into the Internet does not make it work -- it just makes it vulnerable.
Nate Kube's picture
Since the ratification of IEC 62443, updates to this international industrial controls standard have been published to move systems integration work forward.
Eduard Kovacs's picture
US intel chief warns that Russian hackers have been targeting critical infrastructure ICS. Security experts say the threat is real.