Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Siemens has updated its Meltdown and Spectre security bulletin to inform customers of the recently discovered variants, specifically LazyFP and Spectre 1.1 [Read More]
Researchers discover vulnerabilities that expose Siemens SIPROTEC protection relays to DoS attacks [Read More]
Ukraine’s security service says it has blocked a VPNFilter attack on a critical infrastructure organization (a chlorine station) and accused Russian intelligence of being behind the operation [Read More]
Industrial automation company WAGO has patched several high severity flaws that can be chained to take control of its e!DISPLAY HMI devices [Read More]
Researchers find several vulnerabilities, including ones rated high severity, in management and configuration tools from power grid protection company Schweitzer Engineering Laboratories (SEL) [Read More]
Industrial cybersecurity firm Radiflow has raised $18 million in venture funding through an investment round led by Singapore-based engineering company ST Engineering. [Read More]
A CredSSP vulnerability affecting all versions of Windows and patched recently by Microsoft has been found to impact Pepperl+Fuchs HMI devices [Read More]
Several vulnerabilities, including ones rated critical, have been found in SICLOCK central plant clocks from Siemens. Only mitigations have been provided as the affected devices are being phased out [Read More]
U.S. House of Representatives passes “DHS Industrial Control Systems Capabilities Enhancement Act”, a bill aimed at protecting industrial systems against cyberattacks [Read More]
A cyber espionage linked to China has been targeting a secure USB drive built by a South Korean defense company, likely in an attempt to compromise air-gaped systems, according to a report. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Galina Antova's picture
Why are some organizations quicker to act while others lag behind? Based on the conversations I have every day with executives at these organizations, I’ve outlined a few “ABCs” of trends that are making a real difference.
Jalal Bouhdada's picture
The nature of the shipping industry does present highly unique challenges for hardening cybersecurity, but they are not insurmountable.
Stan Engelbrecht's picture
Which unlucky industry will be the latest target caught in the crosshairs of cyber attackers? Unfortunately, there are several reasons that suggest mass transit will be the next casualty, and the potential for damage is quite serious.
Barak Perelman's picture
The breadth of attacks targeting critical infrastructure sectors are not only deeper but also broader than originally thought. Most likely, Russia and others want to acquire a “Red Button” capability that can be used to shut down the power grid.
Jalal Bouhdada's picture
SIS are regularly tested to ensure they meet functional safety requirements; the same regime should be applied to their network security.
Barak Perelman's picture
While TRITON is not the first malware to target industrial control systems (ICS), it does signal that operational networks, which have been largely immune to cyber threats, are now in the crosshairs of attackers.
Galina Antova's picture
Standards have helped keep the domain from being completely exposed to the growing threat, but standards have by no means kept pace with threat actors.
Jim Ivers's picture
The software that controls our infrastructure is vulnerable to attack, and the potential results are far more destructive and pervasive than even science fiction would have us believe.
Barak Perelman's picture
Many systems that support industrial controllers are likely vulnerable to Spectre and Meltdown vulnerabilities, which affect hardware running in the majority of the world’s computing devices.