Security Experts:

long dotted


Attackers are targeting the United States Utilities Sector with LookBack Malware and using phishing attacks impersonating engineering licensing boards to compromise targets. [Read More]
Security researchers from industrial cybersecurity firm Dragos have identified a new threat actor targeting industrial control systems (ICS) related entities in the oil and gas and telecommunications sectors. [Read More]
Eleven vulnerabilities have been found in the Wind River VxWorks real time operating system (RTOS), which is used in many critical infrastructure organizations. [Read More]
Israel-based Cervello, a company focused on cybersecurity solutions for rail and Metro signaling systems, has raised $4.5 million in a seed funding round. [Read More]
The power company in the South African city of Johannesburg has suffered serious disruptions after its systems became infected with a piece of ransomware. [Read More]
Information disclosure, DoS, privilege escalation and code execution vulnerabilities have been found by researchers in Mitsubishi Electric’s FR Configurator2 inverter engineering software. [Read More]
A high-severity vulnerability in Rockwell Automation’s PanelView graphics terminals can be exploited by a remote, unauthenticated attacker to gain root-level access to the device’s file system. [Read More]
Siemens informs customers that several of its products are affected by the Intel MDS vulnerabilities. BIOS updates and mitigations have been made available. [Read More]
U.S. Coast Guard recently warned commercial vessel owners and operators of malware and phishing attacks and potential vulnerabilities in shipboard systems. [Read More]
A researcher warned in February that over 1,200 Phoenix Contact PLCs that should normally be used only in closed networks were exposed to attacks from the internet. There are currently still roughly 1,000 vulnerable devices. [Read More]


rss icon

Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.