HackDig : Dig high-quality web security articles for hacker

3 ICS Security Incidents that Rocked 2016 and What We Should Learn from Them

Physical and digital systems are increasingly linked together in modern industrial environments like those seen in the United States. While this connectivity automates the management of industrial control systems (ICS), it also means a digital attack against our nation’s critical infrastructure could negatively affect users’ physical health and s
Publish At:2016-11-01 00:45 | Read:5529 | Comments:0 | Tags:Featured Articles ICS Security CISR ics malware NCSAM securi

Lessons from the Frontlines of Power Utility Attacks

Security experts have been warning companies and policymakers that systems protecting power utilities and other critical infrastructure are vulnerable to cyber attacks. Those intrusions could produce widespread damage, if they proved to be successful.In fact, as reported by Dark Reading, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
Publish At:2016-10-06 12:20 | Read:3366 | Comments:0 | Tags:Featured Articles ICS Security ics ICS-CERT malware power ra

Why Is Endpoint Protection a Big Deal in ICS Environments?

In a previous blog post, ICS: Next Frontier For Cyber Attacks blog, I spoke about the cybersecurity posture of industrial control systems (ICS) and the enormous implications for such attacks. For industrial organizations, it means downtime and lost business. For individuals, it means potential safety issues and lost services. For society, it means significan
Publish At:2016-09-28 21:40 | Read:3961 | Comments:0 | Tags:Featured Articles ICS Security Belden ics IT Network OT secu

Operation Ghoul Haunting Industrial Organizations with Malware, Data Exfiltration

Industrial control system (ICS) security is a growing concern for organizations around the world. On the one hand, research suggests that vulnerabilities and exposures are increasingly jeopardizing the security of ICS assets. In their report Overload: Critical Lessons from 15 Years of ICS Vulnerabilities, the FireEye iSIGHT threat intelligence team tracked 1
Publish At:2016-08-19 13:15 | Read:3929 | Comments:0 | Tags:Featured Articles ICS Security ics malware security social e

Recommendations for Protecting Against ICS Security Threats

Security is not the same for the industrial control systems (ICS) as it is for information technology (IT). This difference in part arises from the unique characteristics that set IoT and IT environments apart from one another.Take IT, for instance. One of the most important business drivers for securing systems in those types of environments is mitigating r
Publish At:2016-08-08 02:40 | Read:3325 | Comments:0 | Tags:Featured Articles ICS Security Belden David Meltzer ics IT O

FireEye 2016 ICS Vulnerabilities Trend Report: Missed Warnings, Exposed Industrial Environments

Industrial Control Systems (ICS) are the technology workhorses responsible for powering the electric grid and utilities, water treatment plants, oil and gas production, food and beverage manufacturing, and transportation systems, among many others. Our society relies on these systems more than we know to keep life running smoothly.However, a new research rep
Publish At:2016-08-05 01:35 | Read:4854 | Comments:0 | Tags:Featured Articles ICS Security FireEye ICS Vulnerabilties Re

Advantech ICS Gear Still Vulnerable to Shellshock, Heartbleed

Twice in the past year, security researchers have found and reported critical vulnerabilities in Modbus gateways built by Advantech that are used to connect serial devices in industrial control environments to IP networks.Most recently, independent security researcher Neil Smith found hard-coded SSH keys in the Advantech EKI series of devices, while a year a
Publish At:2015-12-03 05:35 | Read:2705 | Comments:0 | Tags:Critical Infrastructure Vulnerabilities Web Security Advante

Unnecessary Risks: Vulnerabilities in ICS Devices

The NERC Critical Infrastructure Protection standards are the most effective tools for securing the electrical supply today. If you think that’s a controversial statement, let me explain why I make it.Cybersecurity in the context of the electrical supply is synonymous with reliability. The cyber-risks to electric utilities are ultimately risks to their
Publish At:2015-12-03 04:25 | Read:3014 | Comments:0 | Tags:Featured Articles ICS Security ICS Devices risks vulnerabilt

5 Key Challenges for the Industrial Internet of Things (IIoT)

The Internet of Things (IoT) is one of the most significant trends in technology today. A melding of innovations in the fields of computing and communication, IoT and its “smart” devices are poised to revolutionize not only user-machine interaction but also the way in which machines engage with one another.Already we are beginning to see the perm
Publish At:2015-12-03 04:25 | Read:3862 | Comments:0 | Tags:Featured Articles ICS Security IoT ICS security IIoT Key Cha

The Industrial Internet of Things: Fueling a New Industrial Revolution

A transformative event is occurring where countless industrial devices, both old and new, are beginning to use Internet Protocol communication technologies.We refer to these collections of IP-enabled industrial devices and associated networks as the Industrial Internet of Things (IIoT). The Industrial IoT is at the very core of disruptive visions, such as In
Publish At:2015-11-30 04:05 | Read:4466 | Comments:0 | Tags:Featured Articles ICS Security IoT Devices IIoT Industrial P

Empowering Pipeline SCADA Cybersecurity

Our nation depends heavily on the more than 2.3 million miles of pipelines in the United States that move oil, gas and other liquid products cross country to delivery points, such as airports, refineries, homes, and businesses.At an average of every 40 miles for natural gas pipelines, there are compressor stations that move the gas further along the pipeline
Publish At:2015-11-03 02:40 | Read:8536 | Comments:0 | Tags:Featured Articles ICS Security cybersecurity ICS-CERT malwar

How Can We Keep Industrial Internet Systems Secure?

The Industrial Internet is on the verge to becoming the largest disruption to the global economy since the Internet revolution in the 1990s. According to GE, it will have a $32.2 trillion impact, representing 46 percent of today’s GDP.As the Industrial Internet continues to grow and have an impact on the way we work and live, it is imperative that industry p
Publish At:2015-11-02 08:40 | Read:6931 | Comments:0 | Tags:Featured Articles ICS Security IIoT Industrial IoT security

Rockwell Patches Serious ‘FrostyURL’ PLC Vulnerability

Rockwell Automation has patched a handful of vulnerabilities in its Allen-Bradley MicroLogix programmable logic controllers, including one that researchers say can be exploited with a single malicious URL.Members of CyberX’s research team disclosed details on the vulnerability Wednesday at the 2015 ICS Cyber Security Conference. The Industrial Control
Publish At:2015-10-29 15:40 | Read:2290 | Comments:0 | Tags:Critical Infrastructure Vulnerabilities Web Security CyberX

ICS Security for Noobz…from DefCon 23

A Intro on Hacking Industrial Control Systems…In Order to Better Defend Them Last year the largest hacker conference in the world, DefCon, experienced something for the first time: an Industrial Control Systems Village. Villages are specialized areas within the conference, dedicated to a portion of cyber security. This village was dedicated purely to h
Publish At:2015-08-28 05:00 | Read:4538 | Comments:0 | Tags:iSIGHT Partners critical infrastructure security critical in

Beyond the Basics of ICS Security – Getting It Right From the Start

The Internet of Things is gradually but very surely creeping in to impact every sphere of modern life. And that goes as much for people as for business, as much for new industries as for incumbent sectors. This network of physical objects has the ability to play havoc with security and is significantly increasing the challenge of securing Industrial Control
Publish At:2015-07-28 07:55 | Read:4056 | Comments:0 | Tags:Off Topic BSidesLV ICS security IT Security Larry Vandenawee


Share high-quality web security related articles with you:)


Tag Cloud