Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Vulnerabilities found in protocol gateway devices can allow hackers targeting industrial systems to launch stealthy attacks. [Read More]
Researchers have described how a botnet powered by high-wattage IoT devices can manipulate the energy market. [Read More]
Researchers have developed a worm to demonstrate that design flaws and vulnerabilities in legacy programming languages can be leveraged by malicious actors to attack industrial robots. [Read More]
High-severity vulnerabilities found in Mitsubishi Electric factory automation products can be exploited to remotely attack industrial organizations. [Read More]
Vulnerabilities discovered in VPN products primarily used for remote access to industrial systems can allow hackers to gain access to ICS and possibly cause physical damage. [Read More]
The NSA and CISA have urged critical infrastructure operators in the United States to take measures to reduce the cyber exposure of industrial assets. [Read More]
The failure of organizations in Israel’s water sector to secure cellular routers made it possible for hackers to launch a second round of attacks on the country’s water facilities. [Read More]
Industrial solutions veteran Yaniv Vardi has been appointed the CEO of industrial cybersecurity company Claroty. [Read More]
A total of 7 ransomware families have been found to target industrial applications, including CLOP, which targets at least 150 OT processes. [Read More]
Industrial cybersecurity firm Claroty has announced the availability of AccessDB Parser, an open source tool that allows researchers to analyze Microsoft Access database files associated with SCADA applications. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.