HackDig : Dig high-quality web security articles for hacker

A simulation shows how a ransomware could hack PLCs in a water treatment plant

The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment plant. The security researchers at the Georgia Institute of Technology have conducted an interesting research on the potential impact of ransomware on industrial control systems (ICS). The researchers David Formby, a Ph.D. stu
Publish At:2017-02-14 10:40 | Read:3881 | Comments:0 | Tags:Breaking News Hacking Security critical infrastructure extor

ICS Sandbox: Diving into the ICS Threat Landscape at RSA Conference

During the second week of February, information security professionals will head over to San Francisco to attend RSA, one of The State of Security’s top 13 conferences for 2017. The conference is primarily focused on information security-related topics and typically draws over 45,000 attendees per year, making it one of the largest information security
Publish At:2017-02-02 01:45 | Read:4462 | Comments:0 | Tags:Featured Articles ICS Security Conference ics security

Top 10 State of Security Articles of 2016

With 2016 coming to a close, The State of Security wanted to give our readers an overview of some of the most interesting, educational, and standout blogs from the year to help fill the time between eating holiday treats and celebrating the New Year.6 Stages of Network Intrusion and How to Defend Against ThemIn June, David Bisson wrote up an article around a
Publish At:2016-12-29 23:50 | Read:5647 | Comments:0 | Tags:Off Topic Hacker ics NERC CIP Phishing ransomware scam

2016 Reflections on ICS Security

As the year approaches the end, it is a time to reflect on 2016 and industrial control systems (ICS) security. Why ICS security? Because securing ICS should be everyone’s concern. Consider the impact on this critical infrastructure and what it means to you.ImpactWhy?Your entertainment—watching movies on your TV or laptop, listening to music, etc.ICS are a cr
Publish At:2016-12-28 10:55 | Read:3590 | Comments:0 | Tags:Featured Articles ICS Security backdoor ics security spear-p

Device Security Issues for the Infosec Community to Consider

The issue of device security has once again returned to the forefront in light of the recent botnet attacks that have leveraged CCTV cameras, DVRs and other Internet of Things (IoT) devices. As a community, especially those of us who are CISSPs, it is our responsibility to think several chess moves ahead and to take deeper dives into the investigative questi
Publish At:2016-11-21 11:06 | Read:3829 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DDoS devic

[CRITICAL] CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow

Have you ever been deep in the mines of debugging and suddenly realized that you were staring at something far more interesting than you were expecting? You are not alone! Recently a Google engineer noticed that their SSH client segfaulted every time they tried to connect to a specific host. That engineer filed a ticket to investigate the behavior and after
Publish At:2016-11-20 03:20 | Read:5146 | Comments:0 | Tags:Application Security Cyber Security Cyber Security Research

OnionDog APT targets Critical Infrastructures and Industrial Control Systems (ICS)

The Helios Team at 360 SkyEye Labs revealed that a group named OnionDog has been infiltrating and stealing information from the energy, transportation and other infrastructure industries of Korean-language countries through the Internet. OnionDog’s first activity can be traced back to October, 2013 and in the following two years it was only active between l
Publish At:2016-11-20 03:20 | Read:5134 | Comments:0 | Tags:Critical Infrastructures Cyber Security Cyber Warfare ICS SC

Kemuri Water Company (KWC) | Hackers change chemical settings at water treatment plant

Hackers manipulated the programmable logic controllers that managed the amount of chemicals used to treat the water to make it safe to drink.   NEW YORK — March 23, 2016 — Hackers breached a water company’s industrial control system and made changes to valve and flow control settings, Verizon revealed in its latest Data Breach Digest. The unnamed w
Publish At:2016-11-20 03:20 | Read:7917 | Comments:0 | Tags:Critical Infrastructures Cyber Security ICS SCADA Security U

Physical Backdoor | Remote Root Vulnerability in HID Door Controllers

If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security postur
Publish At:2016-11-20 03:20 | Read:5165 | Comments:0 | Tags:Critical Infrastructures Cyber Security ICS Physical Securit

How to Approach Cyber Security for Industrial Control Systems

Today’s industrial control systems (ICS) face an array of digital threats. Two in particular stand out. On the one hand, digital attackers are increasingly targeting and succeeding in gaining unauthorized access to industrial organizations. Some actors use malware, while others resort to spear-phishing (or whaling) and other social engineering techniqu
Publish At:2016-11-14 12:05 | Read:3213 | Comments:0 | Tags:Featured Articles ICS Security controllers Cyber endpoints i

SCADA Sssh! Don’t Talk, Filter it

The effects of cyber-attacks against SCADA/ICS are well known, however, there is a great confusion when dealing with mitigation techniques. The Majority are aware of the impact cyber-attacks can have on Industrial Control Systems however, the reality in terms of mitigation techniques are shrouded with confusion and a reactive approach. Recent 0-day vulnerabi
Publish At:2016-11-10 06:35 | Read:4797 | Comments:0 | Tags:Breaking News Hacking Havex ICS Panel Shock SCADA stuxnet ze

CVE-2016-7165 Privilege Escalation flaw affects many Siemens solutions

Siemens released security updates and temporary fixes to fix a privilege escalation flaw, tracked CVE-2016-7165, that affects several industrial products. Siemens has released security updates and temporary fixes to address a privilege escalation vulnerability, tracked CVE-2016-7165, that affects several industrial products. The flaw could be exploited by at
Publish At:2016-11-10 06:35 | Read:3556 | Comments:0 | Tags:Breaking News Hacking Security CVE-2016-7165 ICS SCADA Sieme

How to compromise PLC systems via stealthy Pin control attacks

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems avoid being detected. Security researchers at the Black Hat Europe 2016 have presented a new attack method that could be used to hack programmable logic controllers avoid being detected. programmable logic controllers are essential compon
Publish At:2016-11-05 16:35 | Read:4757 | Comments:0 | Tags:Breaking News Hacking ICS malware PLC PLC rootkit SCADA

Passively Pilfering Pages: How Beepers Threaten ICS Security

In today’s interconnected world, malicious actors take no issue in targeting industrial control systems (ICS). Just look at what’s happened in the past two years alone.Actors have sent spear-phishing emails to a number of industrial organizations in the Middle East; gained unauthorized access to a dam in upstate New York; leveraged BlackEnergy ma
Publish At:2016-11-03 07:45 | Read:6305 | Comments:0 | Tags:Featured Articles ICS Security beepers ics Industrial page T

3 ICS Security Incidents that Rocked 2016 and What We Should Learn from Them

Physical and digital systems are increasingly linked together in modern industrial environments like those seen in the United States. While this connectivity automates the management of industrial control systems (ICS), it also means a digital attack against our nation’s critical infrastructure could negatively affect users’ physical health and s
Publish At:2016-11-01 00:45 | Read:5579 | Comments:0 | Tags:Featured Articles ICS Security CISR ics malware NCSAM securi


Share high-quality web security related articles with you:)


Tag Cloud