More Than 600 ICS Flaws Spotted in H1 2021

More Than 600 ICS Flaws Spotted in H1 2021

A study by Claroty, a company specialising in industrial cyber security, reveals disturbing results about ICS products

Symantec Launches ICSP Neural to Shield Mission-Critical Tech from Cyber Attacks

Symantec Launches ICSP Neural to Shield Mission-Critical Tech from Cyber Attacks

The solution blocks zero-day attacks and USB malware

GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper

GreyEnergy APT Delivers Malware via Phishing Attacks and Multi-Stage Dropper

The modular backdoor can be upgraded remotely by attackers

53 Percent of ICS Networks at Risk Because of Legacy Windows Systems

53 Percent of ICS Networks at Risk Because of Legacy Windows Systems

Report based on data from 850 ICS networks on 6 continents

New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy

New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy

Threat actor targets critical EU infrastructure systems

Unnamed German Nuclear Power Plant Suffered "Disruptive" Cyber-Attack in 2014

Unnamed German Nuclear Power Plant Suffered "Disruptive" Cyber-Attack in 2014

Nuclear watchdog chief reveals cyber-attack on German plant

92 Percent of Internet-Available ICS Hosts Have Vulnerabilities

92 Percent of Internet-Available ICS Hosts Have Vulnerabilities

Vulnerable devices leave door wide open for attacks

Researchers Create Self-Propagating Worm That Targets SCADA Equipment

Researchers Create Self-Propagating Worm That Targets SCADA Equipment

Malware is slowly making its way into the ICS/SCADA field

ICS Security Researchers Publish SCADA Manufacturers Shame List

ICS Security Researchers Publish SCADA Manufacturers Shame List

110+ ICS/SCADA devices have weak default passwords

  • Security
  • By Catalin Cimpanu
  • December 29th, 2015
Railway Systems Susceptible to Cyber-Attacks

Railway Systems Susceptible to Cyber-Attacks

Researchers find a large number of security holes

Iranian Hackers Breached US Dam in 2013

Iranian Hackers Breached US Dam in 2013

Hackers probably didn't know what they were doing

  • Security
  • By Catalin Cimpanu
  • December 14th, 2015
Researchers Fail to Set Up Proper Honeypots <em>UPDATE</em>

Researchers Fail to Set Up Proper Honeypots UPDATE

Weak honeypots means unimportant security intel

DLL Hijacking Risk Removed from Telerik Analytics Monitor Library

DLL Hijacking Risk Removed from Telerik Analytics Monitor Library

Security flaw has not been assigned a CVE identifier

Siemens Fixes Security Flaws in Simatic Step 7 (TIA Portal)

Siemens Fixes Security Flaws in Simatic Step 7 (TIA Portal)

Password reconstruction, privilege escalation risks removed

Siemens Patches Critical Security Issues in Ruggedcom WIN Base Stations

Siemens Patches Critical Security Issues in Ruggedcom WIN Base Stations

Attackers could bypass authentication or execute code

Schneider Electric Fixes Security Flaws in Multiple Products

Schneider Electric Fixes Security Flaws in Multiple Products

Vulnerability exists in DLL in DTM development kit

Buffer Overflow Glitch in Wonderware Server Gets Fix from Schneider Electric

Buffer Overflow Glitch in Wonderware Server Gets Fix from Schneider Electric

ICS-CERT warns of high severity of the vulnerability

 
Want more? Browse: