CrowdStrike, an American cybersecurity firm, released a configuration update for its Falcon sensor software that inadvertently triggered a catastrophic chain reaction.
Category: Featured
Understanding Zones and Conduits
Every professional who designs configure and maintain any type of control systems, need to learn about zones and conduits and manage the new security requirements and develop necessary skills according to their function, even if they are not into industrial cybersecurity.
The State of Knowledge and Risk Management in Industrial Cybersecurity (ISA/IEC-62443-3-2)
The state of knowledge in industrial cybersecurity during the past decade is based on a vast experience. There is a lot more to come soon.
BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacks
BlackCat ransomware has been found to use a new Linux virtual machine called ‘Munchkin’ to launch stealthy attacks. Protect your data by staying informed and up-to-date on the latest security threats.
Cuba ransomware uses Veeam exploit against critical U.S. organizations
“Cuba ransomware: Unleashing a Veeam exploit to wreak havoc on U.S. critical organizations.”
Industrial PLCs worldwide impacted by CODESYS V3 RCE flaws
Industrial PLCs around the world are vulnerable to CODESYS V3 RCE flaws, potentially leading to serious security risks. Learn more about the potential impacts and how to protect your systems.
Physical attacks on power grid surge to new peak – Power Grid Sabotage
People are shooting, sabotaging and vandalizing electrical equipment in the U.S. at a pace unseen in at least a decade, amid signs that domestic extremists hope to use blackouts to sow unrest.
What is Evil PLC attack and how to prevent negative consequences on industrial plants
“Protect your industrial plant from Evil PLC attacks – Implement security measures to prevent negative consequences!” Based on the report created by Team82.
Rationalization: Stop spending valuable resources wrongly
We see very often how companies (through their security staff) go shopping and rush to spend, often pushed by the pressure of the business, the inertia of the market, lack of knowledge, skill and opportunism of suppliers, before performing a good risk assessment.
Automation Systems Cybersecurity: From Standards to Practices
Eric Cosman, chairman of ISA99 Committee, explains that standards, guidance, and direction are available from several sources, but surveys and anecdotal reports have shown that many still struggle with how to turn this information into effective programs. Suppliers have a clear imperative to improve their products, but asset owners often struggle with how to get started. Practical approach into cybersecurity is very hard to find in the market, still today.