SCADA

Which is the Threat landscape for the ICS sector in 2020?Which is the Threat landscape for the ICS sector in 2020?

Which is the Threat landscape for the ICS sector in 2020?

The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering…

4 years ago
Iranian hackers access unsecured HMI at Israeli Water FacilityIranian hackers access unsecured HMI at Israeli Water Facility

Iranian hackers access unsecured HMI at Israeli Water Facility

A group of Iranian hackers gained access to a un unprotected ICS at an Israeli Water Facility and posted a…

5 years ago
A critical flaw in industrial automation systems opens to remote hackA critical flaw in industrial automation systems opens to remote hack

A critical flaw in industrial automation systems opens to remote hack

Experts found a critical flaw in Real-Time Automation's (RTA) 499ES EtherNet/IP stack that could allow hacking industrial control systems. Tracked…

5 years ago
US Treasury imposes sanctions on a Russian research institute behind Triton malwareUS Treasury imposes sanctions on a Russian research institute behind Triton malware

US Treasury imposes sanctions on a Russian research institute behind Triton malware

US Treasury Department announced sanctions against Russia's Central Scientific Research Institute of Chemistry and Mechanics behind Triton malware. The US…

5 years ago
FERC, NERC joint report on cyber incident response at electric utilitiesFERC, NERC joint report on cyber incident response at electric utilities

FERC, NERC joint report on cyber incident response at electric utilities

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best…

5 years ago
Snake Ransomware isolates infected Systems before encrypting filesSnake Ransomware isolates infected Systems before encrypting files

Snake Ransomware isolates infected Systems before encrypting files

Experts spotted recent samples of the Snake ransomware that were isolating the infected systems while encrypting files to avoid interference. Experts from…

5 years ago
Hackers targeted ICS/SCADA systems at water facilities, Israeli government warnsHackers targeted ICS/SCADA systems at water facilities, Israeli government warns

Hackers targeted ICS/SCADA systems at water facilities, Israeli government warns

The Israeli authorities are alerting organizations in the water industry following a series of cyberattacks that hit water facilities in…

5 years ago
Critical buffer overflow in CODESYS allows remote code executionCritical buffer overflow in CODESYS allows remote code execution

Critical buffer overflow in CODESYS allows remote code execution

Experts discovered an easily exploitable heap-based buffer overflow flaw, tracked as CVE-2020-10245, that exists in the CODESYS web server. A…

5 years ago
Talos found tens of dangerous flaws in WAGO ControllersTalos found tens of dangerous flaws in WAGO Controllers

Talos found tens of dangerous flaws in WAGO Controllers

Cisco Talos experts discovered tens of flaws in WAGO products that expose controllers and human-machine interface (HMI) panels to remote…

5 years ago
Dragos Report: Analysis of ICS flaws disclosed in 2019Dragos Report: Analysis of ICS flaws disclosed in 2019

Dragos Report: Analysis of ICS flaws disclosed in 2019

More than 400 flaws affecting industrial control systems (ICS) were disclosed in 2019, more than 100 were zero-day vulnerabilities. According…

5 years ago