Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Australian beverages giant Lion says its systems have been infected with a piece of ransomware that disrupted manufacturing processes and customer service. [Read More]
Critical vulnerabilities found by Cisco researchers expose Siemens’ LOGO! controllers to remote DoS and other attacks. [Read More]
AI company SparkCognition and German industrial giant Siemens have teamed up to offer an industrial security solution for energy companies. [Read More]
A serious DoS vulnerability in Mitsubishi controllers can allow hackers to disrupt the production process in an industrial organization. [Read More]
An analysis of a honeypot-captured attack demonstrates the three basic stages of intrusion, persistence and lateral movement, and simultaneous detonation on as many systems as possible [Read More]
A critical vulnerability affecting traffic light controllers made by SWARCO could have been exploited by hackers to disrupt a city’s traffic lights. [Read More]
Cisco has patched tens of vulnerabilities in its IOS software, including a dozen flaws affecting the company’s industrial routers and switches. [Read More]
Threat actors have targeted industrial suppliers in Japan and several European countries in sophisticated attacks that employed various techniques to make malware detection and analysis more difficult. [Read More]
Israel’s national cyber chief officially acknowledged the country had thwarted a major cyber attack last month against its water systems, an assault widely attributed to arch-enemy Iran. [Read More]
A Kaspersky researcher has identified several vulnerabilities in Emerson OpenEnterprise, a SCADA product designed for the oil and gas industry. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.