ICS

ICS-CERT annual vulnerability coordination report 2015, +74% flaws

The US ICS-CERT published its annual vulnerability coordination report for FY 2015 that provided information about security holes reported to…

9 years ago

Hacking industrial processes with and undetectable PLC Rootkit

Two security researchers have developed an undetectable PLC rootkit that will present at the upcoming Black Hat Europe 2016. The…

9 years ago

Hackers could break into billion computers through their monitor

At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a…

10 years ago

FireEye Report – 33 percent of ICS Flaws had no vendor fixes when reported

FireEye documented more than 1,500 vulnerabilities affecting ICS disclosed in the past 15 years, and some of them are still…

10 years ago

Two flaws in Siemens SICAM PAS impact the energy industry

Researchers discovered two flaws in the Siemens SICAM PAS widely used in the energy industry. One of the vulnerabilities is…

10 years ago

IRONGATE, a mysterious ICS Malware discovered in the wild

Experts at FireEye spotted IRONGATE a mysterious strain of malware that appears to be designed to target industrial control systems…

10 years ago

Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems

Security experts from SCADA StrangeLove group disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems. Recently I…

10 years ago

Civil nuclear facilities worldwide at risk of cyber attack

The nuclear industry is still unprepared to respond cyberattacks exposing civil nuclear facilities worldwide at risk of cyber attacks. Civil…

10 years ago

Dell report revealed attacks on SCADA system are doubled

A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA)…

11 years ago

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

11 years ago

This website uses cookies.