OT

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days 2025-03-12 at 15:03 By Eduard Kovacs Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems. The post China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days appeared first on SecurityWeek. This […]

React to this headline:

Loading spinner

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days Read More »

Armis Acquires Otorio to Expand OT and CPS Security Suite

Armis Acquires Otorio to Expand OT and CPS Security Suite 2025-03-07 at 02:22 By SecurityWeek News The transaction is valued in the range of $120 million and gives Armis an on-premises CPS solution The post Armis Acquires Otorio to Expand OT and CPS Security Suite appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Armis Acquires Otorio to Expand OT and CPS Security Suite Read More »

ICS/OT Security Budgets Increasing, but Critical Areas Underfunded: Report

ICS/OT Security Budgets Increasing, but Critical Areas Underfunded: Report 2025-03-04 at 19:02 By Eduard Kovacs The SANS Institute and OPSWAT have published their 2025 ICS/OT Cybersecurity Budget Report. The post ICS/OT Security Budgets Increasing, but Critical Areas Underfunded: Report appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

ICS/OT Security Budgets Increasing, but Critical Areas Underfunded: Report Read More »

Nine Threat Groups Active in OT Operations in 2024: Dragos

Nine Threat Groups Active in OT Operations in 2024: Dragos 2025-02-25 at 15:00 By Eduard Kovacs Dragos has published its 2025 OT/ICS Cybersecurity Report, which provides information on the threats and trends observed in 2024.  The post Nine Threat Groups Active in OT Operations in 2024: Dragos appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Nine Threat Groups Active in OT Operations in 2024: Dragos Read More »

Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions

Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions 2025-02-19 at 14:05 By Eduard Kovacs Admeritia has launched Cyber Decision Diagrams, a free tool designed to help organizations manage complex decisions related to ICS/OT cybersecurity.  The post Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions Read More »

Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition

Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition 2025-02-14 at 15:45 By Jennifer Leggio In the latest edition of “Rising Tides” we talk with Lesley Carhart, Technical Director of Incident Response at Dragos. The post Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition

React to this headline:

Loading spinner

Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition Read More »

Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations

Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations 2025-02-10 at 15:08 By Eduard Kovacs A critical vulnerability found in Orthanc servers can pose a serious risk to medical data and healthcare operations. The post Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations Read More »

Cyber Insights 2025: OT Security

Cyber Insights 2025: OT Security 2025-02-05 at 16:33 By Kevin Townsend Just as OT technology differs from IT technology, the threats, likely adversaries, and potential harm also differ. The post Cyber Insights 2025: OT Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Cyber Insights 2025: OT Security Read More »

Frenos Raises $3.88M in Seed Funding for OT Security Assessment Platform

Frenos Raises $3.88M in Seed Funding for OT Security Assessment Platform 2025-01-29 at 11:49 By Eduard Kovacs Frenos, a company that has developed an autonomous OT security assessment platform, has raised $3.88 million in seed funding.  The post Frenos Raises $3.88M in Seed Funding for OT Security Assessment Platform appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Frenos Raises $3.88M in Seed Funding for OT Security Assessment Platform Read More »

Building Automation Protocols Increasingly Targeted in OT Attacks: Report

Building Automation Protocols Increasingly Targeted in OT Attacks: Report 2025-01-27 at 16:04 By Eduard Kovacs Industrial automation protocols continue to be the most targeted in OT attacks, but building automation systems have been increasingly targeted.  The post Building Automation Protocols Increasingly Targeted in OT Attacks: Report appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Building Automation Protocols Increasingly Targeted in OT Attacks: Report Read More »

Researchers reveal OT-specific malware in use and in development

Researchers reveal OT-specific malware in use and in development 2024-12-17 at 16:43 By Zeljka Zorz Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient threats based on samples uploaded

React to this headline:

Loading spinner

Researchers reveal OT-specific malware in use and in development Read More »

The role of compromised cyber-physical devices in modern cyberattacks

The role of compromised cyber-physical devices in modern cyberattacks 2024-10-17 at 11:46 By Zeljka Zorz Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attackers’ infrastructure leads to a better understanding of the

React to this headline:

Loading spinner

The role of compromised cyber-physical devices in modern cyberattacks Read More »

Dragos Acquires Network Perception to Boost Visibility

Dragos Acquires Network Perception to Boost Visibility 2024-10-01 at 16:01 By Eduard Kovacs OT security firm Dragos has acquired Network Perception to enhance its platform’s visibility, segmentation and compliance capabilities.  The post Dragos Acquires Network Perception to Boost Visibility appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Dragos Acquires Network Perception to Boost Visibility Read More »

AI, Cybersecurity Top Investment Areas for Industrial Organizations: Cisco

AI, Cybersecurity Top Investment Areas for Industrial Organizations: Cisco 2024-07-30 at 17:01 By Eduard Kovacs Cisco has published its inaugural State of Industrial Networking report, based on a survey of 1,000 individuals. The post AI, Cybersecurity Top Investment Areas for Industrial Organizations: Cisco appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

AI, Cybersecurity Top Investment Areas for Industrial Organizations: Cisco Read More »

ICS Patch Tuesday: Siemens, Schneider Electric, CISA Issue Advisories

ICS Patch Tuesday: Siemens, Schneider Electric, CISA Issue Advisories 2024-07-10 at 15:01 By Ionut Arghire Several ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in industrial and OT products. The post ICS Patch Tuesday: Siemens, Schneider Electric, CISA Issue Advisories appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

ICS Patch Tuesday: Siemens, Schneider Electric, CISA Issue Advisories Read More »

Xona Raises $18 Million for OT Remote Access Platform

Xona Raises $18 Million for OT Remote Access Platform 2024-06-11 at 13:16 By Eduard Kovacs OT zero trust user access platform provider Xona has raised $18 million, which brings its total investment to $32 million. The post Xona Raises $18 Million for OT Remote Access Platform appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Xona Raises $18 Million for OT Remote Access Platform Read More »

Ransomware Attacks on Industrial Orgs Increasingly Impact OT Systems: Survey

Ransomware Attacks on Industrial Orgs Increasingly Impact OT Systems: Survey 07/12/2023 at 15:01 By Eduard Kovacs Ransomware attacks aimed at industrial organizations are increasingly impacting OT systems, according to a Claroty report. The post Ransomware Attacks on Industrial Orgs Increasingly Impact OT Systems: Survey appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Ransomware Attacks on Industrial Orgs Increasingly Impact OT Systems: Survey Read More »

Dragos Offering Free OT Cybersecurity Technology to Small US Utilities

Dragos Offering Free OT Cybersecurity Technology to Small US Utilities 06/12/2023 at 17:46 By Eduard Kovacs The Dragos Community Defense Program is offering free OT cybersecurity software to small electric, water, and natural gas utilities in the US.  The post Dragos Offering Free OT Cybersecurity Technology to Small US Utilities appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Dragos Offering Free OT Cybersecurity Technology to Small US Utilities Read More »

21 Vulnerabilities in Sierra Wireless Routers Could Expose Critical Infrastructure to Attacks

21 Vulnerabilities in Sierra Wireless Routers Could Expose Critical Infrastructure to Attacks 06/12/2023 at 14:17 By Eduard Kovacs Forescout has found 21 vulnerabilities in Sierra Wireless OT/IoT routers that could expose critical infrastructure organizations to remote attacks.  The post 21 Vulnerabilities in Sierra Wireless Routers Could Expose Critical Infrastructure to Attacks appeared first on SecurityWeek.

React to this headline:

Loading spinner

21 Vulnerabilities in Sierra Wireless Routers Could Expose Critical Infrastructure to Attacks Read More »

ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government

ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government 04/12/2023 at 16:16 By Eduard Kovacs Security agencies say the Cyber Av3ngers group targeting ICS at multiple water facilities is affiliated with the Iranian government. The post ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government appeared first

React to this headline:

Loading spinner

ICS at Multiple US Water Facilities Targeted by Hackers Affiliated With Iranian Government Read More »

Scroll to Top