Threat: it can be anything that can compromise the confidentiality, availability, and integrity of one or more cyber-assets. In this context, threats can be natural, technological or entities. A few real examples below.
Vulnerability: it can be one or more weaknesses which can be used by a threat to compromise one or mode cyber-assets. In this context, vulnerabilities can be procedural, technological, or physical. A few real examples below.
CISA warns of actively exploited Juniper pre-auth RCE exploit chain
Eduardo Kando
November 20, 2023
0
In addition, CISA is working with Juniper Networks to develop a patch for the vulnerabilities associated with the exploit chain. CISA is also working with other vendors to ensure that their products a...
The State of Knowledge and Risk Management in Industrial Cybersecurity (ISA/IEC-62443-3-2)
Maximillian G. Kon
November 15, 2023
0
The state of knowledge in industrial cybersecurity during the past decade is based on a vast experience. There is a lot more to come soon.
BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacks
Eduardo Kando
October 24, 2023
0
BlackCat ransomware has been found to use a new Linux virtual machine called 'Munchkin' to launch stealthy attacks. Protect your data by staying informed and up-to-date on the latest security threats.
Building automation giant Johnson Controls hit by ransomware attack
Eduardo Kando
September 30, 2023
0
Johnson Controls, a leading provider of building automation systems, has been hit by a ransomware attack, potentially compromising the security of its customers. The company is working to contain the...
Cuba ransomware uses Veeam exploit against critical U.S. organizations
Eduardo Kando
August 25, 2023
0
"Cuba ransomware: Unleashing a Veeam exploit to wreak havoc on U.S. critical organizations."
Industrial PLCs worldwide impacted by CODESYS V3 RCE flaws
Eduardo Kando
August 15, 2023
0
Industrial PLCs around the world are vulnerable to CODESYS V3 RCE flaws, potentially leading to serious security risks. Learn more about the potential impacts and how to protect your systems.
Physical attacks on power grid surge to new peak – Power Grid Sabotage
Eduardo Kando
July 18, 2023
0
People are shooting, sabotaging and vandalizing electrical equipment in the U.S. at a pace unseen in at least a decade, amid signs that domestic extremists hope to use blackouts to sow unrest.
Cisco warned customers of a high-severity cisco switch vulnerabilities.
Eduardo Kando
July 18, 2023
0
Cisco has recently warned customers of a high-severity vulnerability impacting some of its switch models. This vulnerability could allow attackers to tamper with encrypted traffic, potentially leading...
CosmicEnergy ICS Malware Updates
Eduardo Kando
June 17, 2023
0
CosmicEnergy ICS Malware is a sophisticated cyber-attack targeting industrial control systems. It is designed to steal data, disrupt operations, and cause physical damage to critical infrastructure. P...
What is Evil PLC attack and how to prevent negative consequences on industrial plants
Maximillian G. Kon
March 10, 2023
0
"Protect your industrial plant from Evil PLC attacks - Implement security measures to prevent negative consequences!" Based on the report created by Team82.
Load More