The state of knowledge in industrial cybersecurity during the past decade is based on a vast experience. There is a lot more to come soon.
Category: Threats
BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacks
BlackCat ransomware has been found to use a new Linux virtual machine called ‘Munchkin’ to launch stealthy attacks. Protect your data by staying informed and up-to-date on the latest security threats.
Building automation giant Johnson Controls hit by ransomware attack
Johnson Controls, a leading provider of building automation systems, has been hit by a ransomware attack, potentially compromising the security of its customers. The company is working to contain the attack and restore its systems.
Cuba ransomware uses Veeam exploit against critical U.S. organizations
“Cuba ransomware: Unleashing a Veeam exploit to wreak havoc on U.S. critical organizations.”
Physical attacks on power grid surge to new peak – Power Grid Sabotage
People are shooting, sabotaging and vandalizing electrical equipment in the U.S. at a pace unseen in at least a decade, amid signs that domestic extremists hope to use blackouts to sow unrest.
CosmicEnergy ICS Malware Updates
CosmicEnergy ICS Malware is a sophisticated cyber-attack targeting industrial control systems. It is designed to steal data, disrupt operations, and cause physical damage to critical infrastructure. Protect your systems with advanced security measures.
What is Evil PLC attack and how to prevent negative consequences on industrial plants
“Protect your industrial plant from Evil PLC attacks – Implement security measures to prevent negative consequences!” Based on the report created by Team82.
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
“This PlugX variant is wormable and infects USB devices in such a way that it conceals itself from the Windows operating file system,” Palo Alto Networks Unit 42 researchers Mike Harbison and Jen Miller-Osborn said. “A user would not know their USB device is infected or possibly used to exfiltrate data out of their networks.”
New attacks use Windows security bypass zero-day to drop Qbot malware
New phishing attacks use a Windows zero-day vulnerability to drop the Qbot malware without displaying Mark of the Web security warnings.
Rationalization: Stop spending valuable resources wrongly
We see very often how companies (through their security staff) go shopping and rush to spend, often pushed by the pressure of the business, the inertia of the market, lack of knowledge, skill and opportunism of suppliers, before performing a good risk assessment.