Security Experts:

More Security Headlines

Researchers demonstrate an interesting type of DoS attack on PLCs, where network flooding can lead to the disruption of the physical process controlled by the device. [Read More]
Cisco releases patches for 30 vulnerabilities, including a critical bug impacting ASR 9000 Series Aggregation Services Routers running IOS XR 64-bit software. [Read More]
Several critics of Kaspersky Lab have been targeted by a mysterious individual in an operation similar to that targeting Citizen Lab recently. [Read More]
The effect of this bad bot activity doesn't merely affect legitimate competition and provide access to victim accounts, it skews the entire web ecosystem. [Read More]
Fortinet agreed a deal worth $545,000 to settle a whistleblower lawsuit that alleged that Fortinet had supplied mislabeled goods manufactured by countries including China, falsely representing the goods were in compliance with the U.S Trade Agreements Act (TAA). [Read More]
Hackers scrambled to erase their digital footprints after FireEye linked the Triton/Trisis malware to a Russian government research institute. [Read More]
Most of the malicious activity by Brazilian hackers is within Brazil against Brazilians, but this does not mean that Brazil lacks hacking capabilities, nor that the rest of the world can ignore Brazilian hackers. [Read More]
Iran-linked cyber-espionage group OilRig is making broad use of DNS tunneling across its tools portfolio, Palo Alto Networks security researchers reveal. [Read More]
The European Commission has no evidence of issues associated with using Kaspersky Lab’s products, a document published this week reveals. [Read More]
Oracle’s Critical Patch Update (CPU) for April 2019 fixes nearly 300 vulnerabilities, including many that can be exploited remotely without authentication. [Read More]

ICS/SCADA Cybersecurity

SecurityWeek Experts

rss icon

Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Joshua Goldfarb's picture
If we want our security teams to master the art of stumbling onto great findings, we need to create the right surroundings to foster that.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Grady Summers's picture
Unlike buzzwords from prior years at RSA Conference, this year’s buzzwords are all throwbacks of sorts. They represent a return to fundamentals of information security.
Stan Engelbrecht's picture
Here are a few observations from my time at RSAC 2019 about SOAR and the cybersecurity world at large.
Marc Solomon's picture
You need a way to ensure your threat hunting efforts are focused on high-risk threats and that the team is operating efficiently since time is the enemy.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Justin Fier's picture
The origin story of Mimikatz — a post-exploitation module that has enabled criminals to steal millions of passwords around the world — reads like an over-the-top spy thriller.