ICS

ICS-CERT annual vulnerability coordination report 2015, +74% flawsICS-CERT annual vulnerability coordination report 2015, +74% flaws

ICS-CERT annual vulnerability coordination report 2015, +74% flaws

The US ICS-CERT published its annual vulnerability coordination report for FY 2015 that provided information about security holes reported to…

9 years ago
Hacking industrial processes with and undetectable PLC RootkitHacking industrial processes with and undetectable PLC Rootkit

Hacking industrial processes with and undetectable PLC Rootkit

Two security researchers have developed an undetectable PLC rootkit that will present at the upcoming Black Hat Europe 2016. The…

9 years ago
Hackers could break into billion computers through their monitorHackers could break into billion computers through their monitor

Hackers could break into billion computers through their monitor

At the DEF CON conference, a group of three researchers from Red Balloon Security has demonstrated how to hack a…

9 years ago
FireEye Report – 33 percent of ICS Flaws had no vendor fixes when reportedFireEye Report – 33 percent of ICS Flaws had no vendor fixes when reported

FireEye Report – 33 percent of ICS Flaws had no vendor fixes when reported

FireEye documented more than 1,500 vulnerabilities affecting ICS disclosed in the past 15 years, and some of them are still…

9 years ago
Two flaws in Siemens SICAM PAS impact the energy industryTwo flaws in Siemens SICAM PAS impact the energy industry

Two flaws in Siemens SICAM PAS impact the energy industry

Researchers discovered two flaws in the Siemens SICAM PAS widely used in the energy industry. One of the vulnerabilities is…

9 years ago
IRONGATE, a mysterious ICS Malware discovered in the wildIRONGATE, a mysterious ICS Malware discovered in the wild

IRONGATE, a mysterious ICS Malware discovered in the wild

Experts at FireEye spotted IRONGATE a mysterious strain of malware that appears to be designed to target industrial control systems…

9 years ago
Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systemsSecurity experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems

Security experts disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems

Security experts from SCADA StrangeLove group disclosed SCADAPASS, a list of default credentials for ICS and SCADA systems. Recently I…

9 years ago
Civil nuclear facilities worldwide at risk of cyber attackCivil nuclear facilities worldwide at risk of cyber attack

Civil nuclear facilities worldwide at risk of cyber attack

The nuclear industry is still unprepared to respond cyberattacks exposing civil nuclear facilities worldwide at risk of cyber attacks. Civil…

10 years ago
Dell report revealed attacks on SCADA system are doubledDell report revealed attacks on SCADA system are doubled

Dell report revealed attacks on SCADA system are doubled

A recent report published by Dell revealed a 100 percent increase in the number of attacks on industrial control (SCADA)…

10 years ago
ICS-CERT MONITOR report states most critical infrastructure attacks involve APTsICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

10 years ago