Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

FireEye Launches New OT Threat Intelligence Service

FireEye this week unveiled a new threat intelligence service focusing on operational technology (OT) and other systems that manage physical processes.

The company says its Cyber Physical Threat Intelligence service provides organizations context, data and actionable analysis on threats targeting OT, ICS and IoT systems.

FireEye this week unveiled a new threat intelligence service focusing on operational technology (OT) and other systems that manage physical processes.

The company says its Cyber Physical Threat Intelligence service provides organizations context, data and actionable analysis on threats targeting OT, ICS and IoT systems.

Subscribers will receive information on malware, TTPs, threat activity, threat actors, vulnerabilities, and strategic insights, enabling them to anticipate and prevent attacks.

The information is based on the findings of FireEye and Mandiant experts, as well as the company’s technology and worldwide network of sensors.

“For organizations tasked with maintaining the security and continuity of these systems, Cyber Physical Intelligence provides early warning on critical vulnerabilities, as well as the threat campaigns and adversaries targeting them,” FireEye says. “With Cyber Physical Intelligence, security teams can stay ahead of attackers and make better-informed decisions about the security posture of their cyber physical systems.”

FireEye provides five other threat intelligence subscriptions and one that encompases all of them. They cover operational, cyber espionage, strategic, vulnerability, and cybercrime intelligence.

FireEye’s experts have been called in to conduct on-site investigations by at least two victims of the notorious malware known as Triton, Trisis and HatMan, whose existence came to light in 2017 after it caused disruptions at an oil and gas plant in Saudi Arabia.

Advertisement. Scroll to continue reading.

Related: How to Find Success for IT in an OT World

Related: Tenable Acquires OT Security Firm Indegy for $78 Million

Related: Digital Transformation in Pharma Introduces New OT Security Threats

Related: Cisco to Acquire OT Security Firm Sentryo

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...