Security Experts:

long dotted


Cisco Talos researchers find 17 vulnerabilities in Moxa industrial routers, including many high severity command injection and DoS flaws [Read More]
Mocana TrustCenter provides supply chain integrity, allows faster development and provisioning of devices containing TrustPoint security, and to reduce costs by automating secure enrollment and provisioning at a scale. [Read More]
Industrial Internet Consortium (IIC) develops new IoT Security Maturity Model (SMM), building on its own security framework and reference architecture [Read More]
Electrical substations and other power supply facilities are exposed to attacks by severe vulnerabilities found in Siemens protection relays [Read More]
SecurityWeek’s 2018 Singapore ICS Cyber Security Conference, the premier industrial and critical infrastructure cyber security conference for the APAC region, will take place on April 24-26 at Fairmont Singapore [Read More]
Schneider Electric patches 16 vulnerabilities, including ones rated critical and high severity, in its U.motion Builder building automation software [Read More]
Several natural gas pipeline operators in the United States affected by a cyberattack that hit a communications system provided by a third party [Read More]
Cisco researchers discovered several vulnerabilities in Rockwell Automation’s Allen-Bradley MicroLogix 1400 controllers. Exploitation could result in significant damage [Read More]
Siemens warns customers of critical vulnerabilities in telecontrol and building automation products. High severity flaw found in SIMATIC systems [Read More]
The energy sector was targeted by cyberattacks more than any other industry, and over 170 of the ICS vulnerabilities disclosed last year impacted energy organizations, according to Kaspersky Lab [Read More]


rss icon

Stan Engelbrecht's picture
Which unlucky industry will be the latest target caught in the crosshairs of cyber attackers? Unfortunately, there are several reasons that suggest mass transit will be the next casualty, and the potential for damage is quite serious.
Barak Perelman's picture
The breadth of attacks targeting critical infrastructure sectors are not only deeper but also broader than originally thought. Most likely, Russia and others want to acquire a “Red Button” capability that can be used to shut down the power grid.
Jalal Bouhdada's picture
SIS are regularly tested to ensure they meet functional safety requirements; the same regime should be applied to their network security.
Barak Perelman's picture
While TRITON is not the first malware to target industrial control systems (ICS), it does signal that operational networks, which have been largely immune to cyber threats, are now in the crosshairs of attackers.
Galina Antova's picture
Standards have helped keep the domain from being completely exposed to the growing threat, but standards have by no means kept pace with threat actors.
Jim Ivers's picture
The software that controls our infrastructure is vulnerable to attack, and the potential results are far more destructive and pervasive than even science fiction would have us believe.
Barak Perelman's picture
Many systems that support industrial controllers are likely vulnerable to Spectre and Meltdown vulnerabilities, which affect hardware running in the majority of the world’s computing devices.
Josh Lefkowitz's picture
As many manufacturers continue to integrate automation, IoT devices, and other Internet-connected technologies with their OT networks, they are inadvertently expanding the attack surface area.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the implications of the new EU Directive on Security of Network and Information Systems (NIS)
Barak Perelman's picture
2018 will present new and increasing industrial cyber security challenges for facilities operators, but new developments will help minimize those threats.