Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Several potentially serious vulnerabilities have been discovered in some of the industrial 4G routers made by Phoenix Contact. [Read More]
Tens of vulnerabilities discovered by Cisco Talos researchers in WAGO products expose controllers and HMI panels to attacks. [Read More]
The European Network of Transmission System Operators for Electricity (ENTSO-E) says its corporate network has been breached. [Read More]
The Reading Municipal Light Department (RMLD), an electric utility in Massachusetts that serves over 68,000 residents, was recently hit by a ransomware attack. [Read More]
Vulnerabilities found by Cisco researchers in an industrial networking device made by Moxa can expose industrial environments to attacks. [Read More]
A new report suggests that poorly protected device identities could cost U.S. business between $15 billion and $21 billion. [Read More]
Researchers discovered that Honeywell’s Notifier fire alarm systems are affected by two serious vulnerabilities that can be exploited to hack the system. [Read More]
Over 400 ICS vulnerabilities were disclosed in 2019 and more than a quarter of them had no patches when their existence was made public, according to industrial cybersecurity firm Dragos. [Read More]
Vulnerable, improperly protected Out of Band (OOB) consoles expose ships, drilling rigs, remote shore-based facilities, and even mobile vehicles to attackers, researchers from security firm Pen Test Partners warn. [Read More]
A ransomware infection at a U.S. natural gas compression facility resulted in a two-day operational shutdown of an entire pipeline asset. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.