SCADA

Cyber espionage campaign based on Havex RAT hit ICS/SCADA systems

Security Experts at F-Secure discovered a cyber espionage campaign based in the Havex malware targeting ICS/SCADA systems and vendors. Security…

11 years ago

Impact of Windows XP End of life on Critical Infrastructure

Which is the impact of the Windows XP End of Life on the critical infrastructure? Which are the risks and…

11 years ago

ICS-CERT warns of possible hack of road signs controlled by Daktronics Vanguard software

ICS-CERT issued an alert for the presence of a hardcoded password flaw in Daktronics Vanguard highway dynamic message sign (DMS)…

11 years ago

ICS-CERT warns on the rise in attacks on online ICS

A reading of the data issued by the ISC-CERT in its Monthly Monitor (ICS-MM201404) on the attacks against ICS (industrial…

11 years ago

Critical Infrastructure, hackers targeted public utility SCADA

Cyber attacks could pose a potentially huge risk to US critical infrastructure, state-sponsored hackers and cyber criminals are increasing their…

11 years ago

Hacking Traffic lights and other control systems is not so hard

Security experts Cesar Cerrudo conducted a study on the security of components within control traffic lights and similar electronic systems.…

11 years ago

Critical Infrastructure security, is it possible a shared regulatory?

Reflession on the necessity to adopt a shared regulatory for the security of critical infrastructure. Eugene Kaspersky point of view…

11 years ago

Darpa is looking for experts from private sector for future cyber ops

Darpa is scouting the private companies to recruit high skilled professional and use company infrastructure to protect classified information. The…

12 years ago

Nearly 7600 critical infrastructure vulnerable to bugs in Yokogawa App

Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa…

12 years ago

Is the Agent.btz malware the link between Snake and Red October?

The agent.btz malware may have served as starting point for malware Turla and the malicious code used in the Red…

12 years ago

This website uses cookies.