HackDig : Dig high-quality web security articles for hacker

Threat Landscape for Industrial Automation Systems in H1 2017

Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the results of its research on the threat landscape for industrial automation systems for the first six months of 2017. All statistical data used in this report was collected using the Kaspersky Security Network (KSN), a distributed antivirus network. Th
Publish At:2017-09-28 17:00 | Read:2331 | Comments:0 | Tags:Featured Industrial threats ICS Industrial control systems i

Microsoft Attempts To Fix Stuxnet For The Third Time

Microsoft released a new security update on June 17th in an attempt to patch a vulnerability which allowed the Stuxnet Virus to exploit Windows systems. The Stuxnet Virus which attacks Industrial Control Systems was first discovered in 2010 when it infected Iranian Programmable Logic Controllers.  Stuxnet compromises controllers by first targeting Windows op
Publish At:2017-08-04 21:15 | Read:2488 | Comments:0 | Tags:Breaking News Hacking CVE-2017-8464 ICS industrial control s

ClearEnergy ransomware can destroy process automation logics in critical infrastructure, SCADA and industrial control sy

Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new proof of concept ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controlle
Publish At:2017-04-16 11:35 | Read:4575 | Comments:0 | Tags:Critical Infrastructures Cyber Security Cyber Security Resea

Threat Landscape for Industrial Automation Systems, H2 2016

The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was
Publish At:2017-03-28 07:05 | Read:3046 | Comments:0 | Tags:Analysis Featured Publications ICS Industrial control system

OnionDog APT targets Critical Infrastructures and Industrial Control Systems (ICS)

The Helios Team at 360 SkyEye Labs revealed that a group named OnionDog has been infiltrating and stealing information from the energy, transportation and other infrastructure industries of Korean-language countries through the Internet. OnionDog’s first activity can be traced back to October, 2013 and in the following two years it was only active between l
Publish At:2016-11-20 03:20 | Read:4373 | Comments:0 | Tags:Critical Infrastructures Cyber Security Cyber Warfare ICS SC

Report: More Than 400 Vulnerabilities Disclosed to ICS-CERT in 2015

A new report published by the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) revealed that over 400 vulnerabilities impacting industrial control systems were disclosed to the organization.According to the Annual Vulnerability Coordination Report for the 2015 fiscal year, ICS-CERT published 197 advisories and issued 16 alerts – covering a
Publish At:2016-10-04 23:45 | Read:2849 | Comments:0 | Tags:Latest Security News ics ICS-CERT Industrial Control Systems

Industrial cybersecurity threat landscape

 Download ICS availability statistics (PDF version)  Download ICS vulnerabilities statistics (PDF version) Overview Industrial control systems (ICS) surround us: they are used in electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g., automot
Publish At:2016-07-11 16:40 | Read:3332 | Comments:0 | Tags:Analysis Featured Publications Industrial control systems In

Nation-wide radio station hack airs hours of vulgar “furry sex” ramblings

Some Tuesday morning listeners of KIFT, a Top 40 radio station located in Breckenridge, Colorado, were treated to a radically different programming menu than they were used to. Instead of the normal fare from Taylor Swift, The Chainsmokers, or other pop stars, a hack by an unknown party caused one of the station's signals to broadcast a sexually explicit pod
Publish At:2016-04-07 19:25 | Read:4028 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab exploits hacki

Hackers did indeed cause Ukrainian power outage, US report concludes

A December outage in Ukraine that caused 225,000 customers to lose electricity was the work of hackers, a report prepared by US Department of Homeland Security officials has determined.Further ReadingFirst known hacker-caused power outage signals troubling escalationHighly destructive malware creates "destructive events" at 3 Ukrainian substations.The report
Publish At:2016-02-26 23:55 | Read:3452 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab critical infra

First known hacker-caused power outage signals troubling escalation

Highly destructive malware that infected at least three regional power authorities in Ukraine led to a power failure that left hundreds of thousands of homes without electricity last week, researchers said.The outage left about half of the homes in the Ivano-Frankivsk region of Ukraine without electricity, Ukrainian news service TSN reported in an article po
Publish At:2016-01-05 06:00 | Read:3176 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab blackenergy in

Advantech Clears Hard-Coded SSH Keys from EKI Switches

Critical industrial switches used worldwide for automation contained hard-coded SSH keys that put devices and networks at risk.Advantech, a Taiwanese distributor, has developed new firmware for its EKI-122x series of products that remove the hard-coded SSH keys. SSH keys are a means by which computers authenticate one another without the need for a password.
Publish At:2015-11-06 21:50 | Read:2101 | Comments:0 | Tags:Critical Infrastructure Advantech EKI critical infrastructur

The ISIL is trying to hack American electrical power companies

US authorities confirmed that hackers belonging to the Islamic State (ISIL) are trying to hack American electrical power companies. According to the U.S. law enforcement, the ISIL is trying to hack American energy firms, the news arrives while the US Government  has charged for the first time a man of cyberterrorism. The news
Publish At:2015-10-17 16:20 | Read:2100 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking Intelligence

Industrial Control System (In)Security: Nearly Half of Attacks Go Unattributed

The rise in attacks against the nation’s critical infrastructure control systems – and the potentially devastating consequences these incidents could incur – have resulted in a growing concern among industry leaders and organizations.With many industrial control systems still relying on outdated software and protocols, bolstering the protection of these syst
Publish At:2015-06-25 04:50 | Read:2635 | Comments:0 | Tags:Latest Security News Critical Infrastructure ics Industrial

Industrial Cybersecurity and Service Delivery Don’t Need to Be Mutually Exclusive

Industrial control system (ICS) operators and owners have found themselves in an unenviable position. Once air-gapped, serial-based critical industrial control systems are now becoming more and more connected. And while many of the systems themselves have not changed, the networking world around them has changed dramatically, introducing vulnerabilities and
Publish At:2015-05-06 19:20 | Read:2833 | Comments:0 | Tags:Security FirePOWER Industrial Control Systems security

Taking Advantage of Critical Infrastructure Cybersecurity

 Discussions around industrial control systems (ICS), such as supervisory and control data acquisition (SCADA) systems, often focus on how vulnerable the systems are.A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure.
Publish At:2015-03-17 07:50 | Read:1983 | Comments:0 | Tags:Cyber Security Critical Infrastructure Industrial Control Sy


Share high-quality web security related articles with you:)


Tag Cloud