ICS/SCADA

The role of compromised cyber-physical devices in modern cyberattacks

The role of compromised cyber-physical devices in modern cyberattacks 2024-10-17 at 11:46 By Zeljka Zorz Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attackers’ infrastructure leads to a better understanding of the […]

React to this headline:

Loading spinner

The role of compromised cyber-physical devices in modern cyberattacks Read More »

Geopolitical tensions escalate OT cyber attacks

Geopolitical tensions escalate OT cyber attacks 2024-04-15 at 07:31 By Mirko Zorz In this Help Net Security interview, Andrew Ginter, VP of Industrial Security at Waterfall Security, discusses operational technology (OT) cyber attacks and their 2024 Threat Report. He examines how global geopolitical tensions and evolving ransomware tactics are reshaping industrial cybersecurity. He sheds light

React to this headline:

Loading spinner

Geopolitical tensions escalate OT cyber attacks Read More »

Web-based PLC malware: A new potential threat to critical infrastructure

Web-based PLC malware: A new potential threat to critical infrastructure 2024-03-07 at 13:47 By Zeljka Zorz A group of researchers from Georgia Tech’s College of Engineering have developed web-based programmable logic controller (PLC) malware able to target most PLCs produced by major manufacturers. “Our Web-Based (WB) PLC malware resides in PLC memory, but ultimately gets

React to this headline:

Loading spinner

Web-based PLC malware: A new potential threat to critical infrastructure Read More »

Review: Engineering-grade OT security: A manager’s guide

Review: Engineering-grade OT security: A manager’s guide 2024-01-08 at 08:01 By Helga Labus Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software products for Hewlett

React to this headline:

Loading spinner

Review: Engineering-grade OT security: A manager’s guide Read More »

Why cyber war readiness is critical for democracies

Why cyber war readiness is critical for democracies 17/11/2023 at 14:02 By Zeljka Zorz Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, predicted at IRISSCON on Thursday. Rik Ferguson on stage at IRISSCON 2023 The skills employed, the hacktivists and

React to this headline:

Loading spinner

Why cyber war readiness is critical for democracies Read More »

Sandworm hackers incapacitated Ukrainian power grid amid missile strike

Sandworm hackers incapacitated Ukrainian power grid amid missile strike 09/11/2023 at 19:17 By Helga Labus Russia-backed ATP group Sandworm is behind the cyberattack that caused disruption of parts of the Ukrainian power grid in late 2022, according to Mandiant. About Sandworm “Sandworm is a threat actor that has carried out cyber operations in support of

React to this headline:

Loading spinner

Sandworm hackers incapacitated Ukrainian power grid amid missile strike Read More »

ELITEWOLF: NSA’s repository of signatures and analytics to secure OT

ELITEWOLF: NSA’s repository of signatures and analytics to secure OT 17/10/2023 at 05:02 By Help Net Security Cyber entities continue to show a persistent interest in targeting critical infrastructure by taking advantage of vulnerable OT assets. To counter this threat, NSA has released a repository for OT Intrusion Detection Signatures and Analytics to the NSA

React to this headline:

Loading spinner

ELITEWOLF: NSA’s repository of signatures and analytics to secure OT Read More »

Unnamed APT eyes vulnerabilities in Rockwell Automation industrial contollers (CVE-2023-3595 CVE-2023-3596)

Unnamed APT eyes vulnerabilities in Rockwell Automation industrial contollers (CVE-2023-3595 CVE-2023-3596) 13/07/2023 at 15:46 By Zeljka Zorz Rockwell Automation has fixed two vulnerabilities (CVE-2023-3595, CVE-2023-3596) in the communication modules of its ControlLogix industrial programmable logic controllers (PLCs), ahead of expected (and likely) in-the-wild exploitation. “An unreleased exploit capability leveraging these vulnerabilities is associated with an

React to this headline:

Loading spinner

Unnamed APT eyes vulnerabilities in Rockwell Automation industrial contollers (CVE-2023-3595 CVE-2023-3596) Read More »

Security Gaps in Green Energy Sector: Unveiling the Hidden Dangers of Public-Facing PV Measuring and Diagnostics Solutions

Security Gaps in Green Energy Sector: Unveiling the Hidden Dangers of Public-Facing PV Measuring and Diagnostics Solutions 05/07/2023 at 13:16 By cybleinc Cyble analyses the threat to Photovoltaic systems via 130k Photovoltaic Monitoring & Diagnostic solutions exposed over the internet. The post Security Gaps in Green Energy Sector: Unveiling the Hidden Dangers of Public-Facing PV

React to this headline:

Loading spinner

Security Gaps in Green Energy Sector: Unveiling the Hidden Dangers of Public-Facing PV Measuring and Diagnostics Solutions Read More »

How cybercriminals target energy companies

How cybercriminals target energy companies 15/06/2023 at 07:34 By Help Net Security In this Help Net Security video, Jim Simpson, Director of Threat Intelligence at Searchlight Cyber, discusses how cybercriminals employ specialized strategies when targeting energy companies. This is primarily due to the sensitive and valuable information these organizations hold and their critical role in

React to this headline:

Loading spinner

How cybercriminals target energy companies Read More »

Scroll to Top