Security Experts:

long dotted


Drone strikes on Saudi oil infrastructure highlights the easy vulnerability of such facilities even as the kingdom has splurged billions on sophisticated defense hardware. [Read More]
Several critical and high-severity vulnerabilities that can be exploited remotely have been found recently in widely used CODESYS industrial products. [Read More]
The Russian hackers behind the 2016 Crashoverride/Industroyer attack that caused a power outage in Ukraine may have been hoping to cause more serious damage. [Read More]
Siemens issues several security advisories, including for the Windows flaws tracked as DejaBlue and the Linux kernel SACK flaws. [Read More]
A denial-of-service (DoS) attack exploiting a known vulnerability disrupted firewalls at a US power utility. [Read More]
US-based Red Lion has addressed several vulnerabilities, including ones classified as serious, in its Crimson HMI software. [Read More]
Industry professionals comment on reports that an Iranian mole helped the US and Israel plant the Stuxnet malware on computers at an Iranian nuclear facility. [Read More]
PLC and HMI software from EZAutomation is affected by remote code execution vulnerabilities that can be exploited with specially crafted project files. [Read More]
Security researchers from Secureworks have analyzed several tools used by the Hexane threat actor in attack campaigns against industrial organizations over the past several months. [Read More]
Sensitive data from a nuclear power plant in Ukraine was exposed due to an illegal cryptocurrency mining operation run by workers. [Read More]


rss icon

Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.