Security Experts:

long dotted


Electrum, the Russia-linked hacker group responsible for the 2016 power outage in Ukraine, no longer focuses exclusively on Ukraine [Read More]
Researchers find new stage 3 modules of VPNFilter malware and determine that devices from ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE are also targeted [Read More]
Israel-based Cyberbit Ltd., a provider of cyber range training and simulation platforms, has received a $30 million investment from investment firm Claridge Israel. [Read More]
Japanese electrical engineering company Yokogawa patches hardcoded credentials vulnerability affecting its STARDOM controllers [Read More]
A threat actor linked to North Korea’s Lazarus Group has stopped targeting organizations in the US, but remains active in Europe and East Asia [Read More]
FBI’s analysis of massive VPNFilter attack raises some questions on Russia-linked hacker groups. Agency advises users to reboot routers [Read More]
A high severity XXE vulnerability affecting Schneider Electric EcoStruxure Machine Expert PLC programming software can be exploited remotely to obtain sensitive data [Read More]
Xenotime, the threat group behind the Triton/Trisis attack, is still active and it has targeted entities far outside the Middle East and safety systems other than Triconex [Read More]
Cybersecurity research and engineering firm GRIMM has opened a new Grand Rapids, MI-based cybersecurity research lab for automotive, aerospace, defense and manufacturing industries. [Read More]
Russia may be preparing a new cyberattack on Ukraine using a botnet of at least 500,000 routers and NAS devices. The malware has destructive capabilities and can target SCADA systems [Read More]


rss icon

Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.
Barak Perelman's picture
The new connectivity between IT and OT has created a clear and present cyber threat to previously isolated ICS environments.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Galina Antova's picture
Why are some organizations quicker to act while others lag behind? Based on the conversations I have every day with executives at these organizations, I’ve outlined a few “ABCs” of trends that are making a real difference.
Jalal Bouhdada's picture
The nature of the shipping industry does present highly unique challenges for hardening cybersecurity, but they are not insurmountable.
Stan Engelbrecht's picture
Which unlucky industry will be the latest target caught in the crosshairs of cyber attackers? Unfortunately, there are several reasons that suggest mass transit will be the next casualty, and the potential for damage is quite serious.
Barak Perelman's picture
The breadth of attacks targeting critical infrastructure sectors are not only deeper but also broader than originally thought. Most likely, Russia and others want to acquire a “Red Button” capability that can be used to shut down the power grid.
Jalal Bouhdada's picture
SIS are regularly tested to ensure they meet functional safety requirements; the same regime should be applied to their network security.
Barak Perelman's picture
While TRITON is not the first malware to target industrial control systems (ICS), it does signal that operational networks, which have been largely immune to cyber threats, are now in the crosshairs of attackers.
Galina Antova's picture
Standards have helped keep the domain from being completely exposed to the growing threat, but standards have by no means kept pace with threat actors.