HackDig : Dig high-quality web security articles for hackers

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Operational technology (OT) encompasses many aspects of our world, including industrial control systems (ICS) that are used to control core operational processes. ICS technologies often control essential services such as water and power supply and are also used to monitor these services to prevent hazardous conditions. Manipulation of these systems and proce
Publish At:2020-05-03 08:13 | Read:337 | Comments:0 | Tags:Energy & Utility Security Intelligence & Analytics Security

Leverage ATT&CK for ICS to Secure Industrial Control Systems

Not too many of us have directly experienced the unavailability of a critical service or infrastructure (e.g., power outages, unavailability of hospital data, etc.), but we as a security community have seen an explosive growth of cyberattacks targeting operational technology (OT) environments recently. The IBM X-Force Threat Intelligence Index 2020 found tha
Publish At:2020-03-02 12:20 | Read:420 | Comments:0 | Tags:Energy & Utility Security Intelligence & Analytics Critical

Reading Municipal Light Department, an electric utility in Massachusetts, hit by ransomware

The Reading Municipal Light Department (RMLD), an electric utility in Massachusetts, announced it was hit by a ransomware attack. This week, the Reading Municipal Light Department (RMLD), an electric utility in Massachusetts, announced it was hit by a ransomware attack. Reading Municipal Light Department provides electricity to over 68,000 citizens tha
Publish At:2020-02-26 11:32 | Read:547 | Comments:0 | Tags:Breaking News Cyber Crime Hacking critical infrastructure ha

What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

The recently published IBM X-Force Threat Intelligence Index 2020 pointed out that over 8.5 billion records were compromised in 2019, a figure that’s more than 200 percent greater than the number of records lost in 2018. It also determined that scanning and exploitation of vulnerabilities have increased from just 8 percent of attacks in 2018 to nearly
Publish At:2020-02-20 10:49 | Read:628 | Comments:0 | Tags:CISO Energy & Utility Security Services Brute-Force Attack C

X-Force Threat Intelligence Index Reveals Top Cybersecurity Risks of 2020

The volume of threats that security teams see on a daily basis can make it especially difficult to look at the big picture when it comes to developing an effective cybersecurity strategy. To see through the flood of data and alerts, organizations depend on actionable threat intelligence to help them understand and mitigate risks. Looking at long-term trends
Publish At:2020-02-11 08:51 | Read:772 | Comments:0 | Tags:Advanced Threats Threat Intelligence Cloud Cloud Adoption Cl

LYCEUM and the dangers of spear phishing

Critical infrastructure is one of the favorite targets for the sophisticated attacks carried out by APTs (advanced persistent threats). What makes these APTs really dangerous is the fact that their attacks are never random, and always have a specific target. If an advanced cyberattack managed to paralyze the water supply, or interrupt hospital service, the A
Publish At:2019-09-19 17:05 | Read:1183 | Comments:0 | Tags:News Security business critical infrastructure spear phishin

Securing smart grid and advanced metering infrastructure

The year is 2020, high economic, military and cultural tension between Russia & the US. You are at the London office, entering a video meeting with the sales team in America, the American team presents with enthusiasm the sales achievement of the recent quarter, then, suddenly the call is disconnected. You are trying to re-establish the connection with n
Publish At:2017-10-06 11:30 | Read:4383 | Comments:0 | Tags:Breaking News Security critical infrastructure cyber securit

What Do Recent Attacks Mean for OT Network Security?

Security management can be proactive or reactive depending on each organization’s risk appetite. When attacks are made public, things change, and learning from threats becomes a requirement for both C-suite members and security leaders. WannaCry, NotPetya and Industroyer are some of the most recently analyzed malware pieces. Apart from corporate networ
Publish At:2017-09-27 22:46 | Read:4931 | Comments:0 | Tags:Endpoint Energy & Utility Incident Response Network Critical

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive purposes. Symantec has spotted a new wave of cyber attacks against firms in the energy sector powered by the notorious Dragonfly group. The Dragonfly group, also known as Energetic Bear, has been active since at least 2011
Publish At:2017-09-07 16:19 | Read:4028 | Comments:0 | Tags:APT Breaking News Hacking critical infrastructure Dragonfly

Flaws in solar panels potentially threatening European power grids

The Horus scenario, is a scenario describing a large scale cyber attack targeting the vital electrical infrastructure triggering flaws found in solar panels Willem Westerhof, a Dutch security researcher at the security firm ITsec has found a serious vulnerability in a component of solar panels that could be exploited by hackers to cause widespread outages in
Publish At:2017-08-06 11:20 | Read:2933 | Comments:0 | Tags:Breaking News Hacking critical infrastructure energy Horus s

Critical Vulnerabilities discovered in Radiation Monitoring Devices (RDMs) used at Power Plants and Airports

Experts discovered flaws in widely deployed Radiation Monitoring Devices (RDMs) that could be triggered to raise false alarms and worse. This week at Black Hat in Las Vegas, researchers at information security firm IO Active, disclosed their findings on radiation monitoring devices from Ludum, Mirion, and Digi that were found to contain multiple unpatched vu
Publish At:2017-07-28 23:00 | Read:4323 | Comments:0 | Tags:Breaking News Hacking #blackhat2017 critical infrastructure

Malware experts at ESET released a free tool for ICS Malware analysis

Security experts from ESET that spotted the Industroyer malware used against Ukraine’s power grid released a free tool for ICS Malware analysis ESET researchers Robert Lipovsky and Anton Cherepanov have released a free tool for the analysis of ICS malware. The security duo is the same that discovered the CrashOverride/Industroyer malware that targeted
Publish At:2017-07-28 04:35 | Read:4723 | Comments:0 | Tags:Breaking News Malware BlackEnergy critical infrastructure IC

Estonia to Build Off-Site Data Center in Luxembourg

Lots of companies have disaster recovery data centers located far from their headquarters, but Estonia is the first government to build an off-site data center in another country. The small Baltic nation will make backup copies of its critical data infrastructure and store them in Luxembourg if agreements between the two countries are reached. The idea is th
Publish At:2017-07-27 00:40 | Read:4639 | Comments:0 | Tags:Data Protection Government Critical Infrastructure Data Cent

NATO attributed the massive NotPetya attack to a ‘state actor’ and call for a joint investigation

NATO attributed the massive NotPetya attack to a ‘state actor,’ NotPetya and WannaCry Call for a Joint Response from International Community. According to NATO, the recent massive attack based on NotPetya ransomware was powered by a “state actor.” The malware infected over 12,000 devices in around 65 countries, the malicious code hit
Publish At:2017-07-02 12:06 | Read:3693 | Comments:0 | Tags:Breaking News Cyber warfare Hacking critical infrastructure

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after the massive WannaCry attack the French authorities seized a server running two Tor relays in connection to the ransomware campaign, both relays were also working as Tor entry guard nodes, key components of Tor routing w
Publish At:2017-06-11 18:50 | Read:3871 | Comments:0 | Tags:Breaking News Deep Web Malware critical infrastructure Cyber


Share high-quality web security related articles with you:)