Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Kaspersky Unveils ICS Vulnerabilities Database

Kaspersky on Thursday announced the ICS Vulnerabilities Database, a new service designed to help industrial organizations keep track of relevant security flaws and protect their networks against potential threats.

Kaspersky on Thursday announced the ICS Vulnerabilities Database, a new service designed to help industrial organizations keep track of relevant security flaws and protect their networks against potential threats.

The ICS Vulnerabilities Database provides Kaspersky customers access to continuously updated information on weaknesses affecting industrial control systems (ICS) and industrial Internet of Things (IIoT) devices.

Each record in this database will include detailed technical information that is delivered in both a human-readable format and a machine-readable format through a REST API. The API will allow organizations to feed the data to their existing security tools.

The ICS Vulnerabilities Database also includes a component called the Network Attacks Signatures Database, which provides customers signatures for known ICS threats. This data can be integrated with third-party intrusion detection systems (IDS).

Learn More About ICS Vulnerabilities at SecurityWeek’s 2019 ICS Cyber Security Conference

The new service is expected to become available in December 2019. Companies interested in acquiring or testing the service have been advised to contact Kaspersky via email at ics(at)kaspersky.com.

Kaspersky says its ICS CERT researchers find no less than 60 vulnerabilities in ICS and IIoT products every year, and these flaws can affect hundreds or thousands of systems.

“Penetration testing and periodic vulnerability assessments of an industrial enterprise might give a good picture of its current cybersecurity state,” said Georgy Shebuldaev, head of industrial cybersecurity business development at Kaspersky. “ Unfortunately, existing publicly available ICS or IIoT vulnerability information sources lack much of the required information, consistency and clarity to be useful for effective continuous vulnerability assessments. This new service aims to help customers enhance their vulnerability management and incident detection with Kaspersky threat expertise and guidance.”

Advertisement. Scroll to continue reading.

Related: Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

Related: Malware on ICS Increasingly Comes From Internet: Kaspersky

Related: CVSS Scores Often Misleading for ICS Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...