Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

FireEye Launches New OT Threat Intelligence Service

FireEye this week unveiled a new threat intelligence service focusing on operational technology (OT) and other systems that manage physical processes.

The company says its Cyber Physical Threat Intelligence service provides organizations context, data and actionable analysis on threats targeting OT, ICS and IoT systems.

FireEye this week unveiled a new threat intelligence service focusing on operational technology (OT) and other systems that manage physical processes.

The company says its Cyber Physical Threat Intelligence service provides organizations context, data and actionable analysis on threats targeting OT, ICS and IoT systems.

Subscribers will receive information on malware, TTPs, threat activity, threat actors, vulnerabilities, and strategic insights, enabling them to anticipate and prevent attacks.

The information is based on the findings of FireEye and Mandiant experts, as well as the company’s technology and worldwide network of sensors.

“For organizations tasked with maintaining the security and continuity of these systems, Cyber Physical Intelligence provides early warning on critical vulnerabilities, as well as the threat campaigns and adversaries targeting them,” FireEye says. “With Cyber Physical Intelligence, security teams can stay ahead of attackers and make better-informed decisions about the security posture of their cyber physical systems.”

FireEye provides five other threat intelligence subscriptions and one that encompases all of them. They cover operational, cyber espionage, strategic, vulnerability, and cybercrime intelligence.

FireEye’s experts have been called in to conduct on-site investigations by at least two victims of the notorious malware known as Triton, Trisis and HatMan, whose existence came to light in 2017 after it caused disruptions at an oil and gas plant in Saudi Arabia.

Related: How to Find Success for IT in an OT World

Advertisement. Scroll to continue reading.

Related: Tenable Acquires OT Security Firm Indegy for $78 Million

Related: Digital Transformation in Pharma Introduces New OT Security Threats

Related: Cisco to Acquire OT Security Firm Sentryo

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...