Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Schneider Electric’s EVlink Parking vehicle charging stations are affected by vulnerabilities that can be exploited for (remote) hacker attacks. [Read More]
High severity DoS vulnerability impacts several Yokogawa ICS products, including control and safety instrumented systems, a SCADA tool, a plant resource manager, and an OPC interface package. [Read More]
ICS security experts from several companies share interesting stories from the field. [Read More]
The Idaho National Laboratory is mainly known as the nation's primary lab for nuclear research. But in the past decade, its cybersecurity work has put it on the leading edge there as well, and it's expanding. [Read More]
Critical and high severity flaws found in Pluto gateways for ABB safety PLCs. No firmware updates will be released as the impacted products are EOL. [Read More]
Siemens SINUMERIK controllers are affected by DoS, privilege escalation and code execution vulnerabilities, including several flaws rated critical. [Read More]
Italian oil services company Saipem has confirmed that its systems were hit by a new variant of Shamoon, but the malware has also reportedly been used against other energy firms operating in the Middle East. [Read More]
Claroty has added new capabilities to its industrial cybersecurity platform, including virtual zones and multispectral data acquisition. [Read More]
Several critical infrastructure organizations in Russia have been targeted by hackers believed to be profit-driven cybercriminals rather than state-sponsored cyberspies. [Read More]
Italian oil and gas services company Saipem hit by a cyberattack. The firm is working on restoring affected systems while trying to determine who was behind the attack. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Barak Perelman's picture
Many organizations with OT networks face a massive challenge to maintain operational efficiency and improve network security at the same time.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.