HackDig : Dig high-quality web security articles for hackers

NSA/CISA joint report warns on attacks on critical industrial systems

NSA is warning of cyber attacks launched by foreign threat actors against organizations in the critical infrastructure sector across the U.S. The U.S. National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an alert warning of cyber attacks targeting critical infrastructure across the U.S. “Over recent mont
Publish At:2020-07-27 15:20 | Read:367 | Comments:0 | Tags:Breaking News Hacking ICS-SCADA CISA critical infrastructure

CISA, NSA Lay Out Recommendations for Protecting OT Assets

The Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) laid out a series of recommendations for critical infrastructure owners and operators to protect their operational technology (OT) assets.In an alert published on July 23, CISA published an alert in which it recognized malicious actors’ growing willingn
Publish At:2020-07-27 14:29 | Read:425 | Comments:0 | Tags:ICS Security Latest Security News CISA NSA OT

US CISA warns of Ransomware attacks impacting pipeline operations

The Cybersecurity and Infrastructure Security Agency (CISA) is warning critical U.S. infrastructure operators of a recent ransomware attack that affected a natural gas compression facility. The Cybersecurity and Infrastructure Security Agency (CISA) issued an alert across critical U.S. infrastructure sectors about a recent infection at a natural gas comp
Publish At:2020-02-19 02:10 | Read:739 | Comments:0 | Tags:Breaking News Hacking Malware CISA DHS information security

OT attacks increased by over 2000 percent in 2019, IBM reports

According to IBM, OT attacks increased by over 2000 percent in 2019, most of them involved the Echobot IoT malware. IBM’s 2020 X-Force Threat Intelligence Index report analyzes the threat landscape in 2019, the experts observed a spike in the number of OT attacks. According to IBM X-Force, attacks targeting operational technology (OT) infrastructure in
Publish At:2020-02-11 12:45 | Read:789 | Comments:0 | Tags:Hacking Internet of Things Malware Reports Echobot informati

Navigating ICS Security: Having your Action Plan Ready

Trust, respect, understanding. These are all two-way relationships that must be earned over time. Whilst someone being hired in a senior position will likely already have a certain level of each, part of your job is to continuously cultivate all three of these elements with colleagues no matter your grade. When working within a cybersecurity practice, it is
Publish At:2020-02-09 10:22 | Read:591 | Comments:0 | Tags:ICS Security CMA ics OT

ClearEnergy ransomware can destroy process automation logics in critical infrastructure, SCADA and industrial control sy

Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new proof of concept ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controlle
Publish At:2017-04-16 11:35 | Read:7632 | Comments:0 | Tags:Critical Infrastructures Cyber Security Cyber Security Resea

More than 90% of IT Pros Expect More Attacks, Risk, and Vulnerability with IIoT in 2017

The Internet of Things (IoT) embodies great promise and risk. On the one hand, ordinary users view IoT as a means of streamlining their activities across billions of “smart” devices. They hope such connectivity will ultimately translate into better and easier lives. On the other hand, IoT devices aren’t always designed with security in mind
Publish At:2017-03-13 16:15 | Read:4568 | Comments:0 | Tags:Featured Articles ICS Security IIoT IT OT Vulnerability

68% of Oil and Gas Organizations Have Suffered a Digital Attack, Reveals Report

A new report reveals that 68 percent of oil and gas organizations have experienced at least one digital attack.In the Siemens-sponsored The State of Cybersecurity in the Oil & Gas Industry: United States (PDF), Ponemeon Institute surveyed 377 individuals based in the United States who are responsible for overseeing digital risk to their organization̵
Publish At:2017-02-27 10:30 | Read:4746 | Comments:0 | Tags:Latest Security News ics IT OT

4 Tips for a Successful OT & IT Security Marriage

Securing critical infrastructure is becoming a priority for the public and private sectors. Cyber professionals everywhere are rejoicing about the increasing investments in protecting the networks and systems that keep us safe at night. The Oval Office has even signaled its intentions to make security a priority.We welcome the new administration’s desire for
Publish At:2017-02-15 03:15 | Read:6239 | Comments:0 | Tags:Featured Articles ICS Security IT OT security

Kemuri Water Company (KWC) | Hackers change chemical settings at water treatment plant

Hackers manipulated the programmable logic controllers that managed the amount of chemicals used to treat the water to make it safe to drink.   NEW YORK — March 23, 2016 — Hackers breached a water company’s industrial control system and made changes to valve and flow control settings, Verizon revealed in its latest Data Breach Digest. The unnamed w
Publish At:2016-11-20 03:20 | Read:9475 | Comments:0 | Tags:Critical Infrastructures Cyber Security ICS SCADA Security U

Why Is Endpoint Protection a Big Deal in ICS Environments?

In a previous blog post, ICS: Next Frontier For Cyber Attacks blog, I spoke about the cybersecurity posture of industrial control systems (ICS) and the enormous implications for such attacks. For industrial organizations, it means downtime and lost business. For individuals, it means potential safety issues and lost services. For society, it means significan
Publish At:2016-09-28 21:40 | Read:4747 | Comments:0 | Tags:Featured Articles ICS Security Belden ics IT Network OT secu

Recommendations for Protecting Against ICS Security Threats

Security is not the same for the industrial control systems (ICS) as it is for information technology (IT). This difference in part arises from the unique characteristics that set IoT and IT environments apart from one another.Take IT, for instance. One of the most important business drivers for securing systems in those types of environments is mitigating r
Publish At:2016-08-08 02:40 | Read:3995 | Comments:0 | Tags:Featured Articles ICS Security Belden David Meltzer ics IT O

Defensibility: Moving from Defensible to Defended

Defensible and defended are not the same thing. There are characteristics of an environment that make it more or less defensible. While IT and OT environments both have some mixed results, in general, OT environments are more defensible than IT environments. My hypothesis, as a reminder, is that a more defensible network is one in which currently unknown att
Publish At:2015-10-19 20:30 | Read:5893 | Comments:0 | Tags:Featured Articles Incident Detection architecture defensibil

Defensibility: Comparing OT and IT Environments

ICS networks have a lot of considerations. Policies and processes can hamper success. But they are far more defensible than IT networks.— Robert M. Lee (@RobertMLee) September 15, 2015 Sometimes a tweet can catch your attention in interesting ways.Robert’s use of the term ‘defensible’ to describe ICS networks got me thinking about what make
Publish At:2015-09-18 07:20 | Read:3938 | Comments:0 | Tags:Featured Articles Incident Detection defensibility EnergySec

To Succeed with Big Data, Enterprises Must Drop an IT-Centric Mindset; Securing IoT Networks Requires New Thinking

To help organizations who aspire to apply the power of big data enterprise-wide, Cisco provides a powerful, efficient, and secure infrastructure and a wide array of analytics solutions. In our previous blogs, others have highlighted the benefits of Cisco’s ability to provide the scalability, ability to process both real-time data and historical data with pre
Publish At:2014-10-08 11:30 | Read:3625 | Comments:0 | Tags:Security Big Data IoE IoT OT security unlock big data

Tools

Tag Cloud