HackDig : Dig high-quality web security articles for hacker

Threat Landscape for Industrial Automation Systems in H1 2017

Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the results of its research on the threat landscape for industrial automation systems for the first six months of 2017. All statistical data used in this report was collected using the Kaspersky Security Network (KSN), a distributed antivirus network. Th
Publish At:2017-09-28 17:00 | Read:144 | Comments:0 | Tags:Featured Industrial threats ICS Industrial control systems i

Microsoft Attempts To Fix Stuxnet For The Third Time

Microsoft released a new security update on June 17th in an attempt to patch a vulnerability which allowed the Stuxnet Virus to exploit Windows systems. The Stuxnet Virus which attacks Industrial Control Systems was first discovered in 2010 when it infected Iranian Programmable Logic Controllers.  Stuxnet compromises controllers by first targeting Windows op
Publish At:2017-08-04 21:15 | Read:702 | Comments:0 | Tags:Breaking News Hacking CVE-2017-8464 ICS industrial control s

Experts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed to target power grids. The experts published a detailed analysis of the malware, they speculated the malicious code has been involved in the December 2016 attack on an electrical substation in Ukraine. “Win32/Industroyer is
Publish At:2017-06-13 07:40 | Read:431 | Comments:0 | Tags:APT Breaking News Hacking Malware BlackEnergy CRASHOVERRIDE

ICS Companies Are Worried About Cybersecurity, But Are They Worried About the Right Things?

Companies operating Industrial Control Systems (ICS) have a special set of challenges to deal with. Which is the state of the art? The equipment was expected to be installed and left alone for a long time. Pressures to reduce operating costs led to this equipment being connected, and the easiest networking equipment to find was designed for convenience in a
Publish At:2017-06-13 07:40 | Read:525 | Comments:0 | Tags:Breaking News Hacking Reports authentication cyber security

Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem

The increased connectivity of computer and robot systems in the industry 4.0. ecosystem, is, and will be exposing robots to cyber attacks in the future. Indeed, industrial robots—originally conceived to be isolated—have evolved, and are now exposed to corporate networks and the internet. While this provides synergy effects and higher efficiency in production
Publish At:2017-05-03 20:40 | Read:785 | Comments:0 | Tags:Internet of Things ICS industrial robot industrial security

ClearEnergy ransomware can destroy process automation logics in critical infrastructure, SCADA and industrial control sy

Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new proof of concept ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controlle
Publish At:2017-04-16 11:35 | Read:947 | Comments:0 | Tags:Critical Infrastructures Cyber Security Cyber Security Resea

Threat Landscape for Industrial Automation Systems, H2 2016

The Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) is starting a series of regular publications about our research devoted to the threat landscape for industrial organizations. All statistical data used in the report was obtained using Kaspersky Security Network (KSN), a distributed antivirus network. Data was
Publish At:2017-03-28 07:05 | Read:783 | Comments:0 | Tags:Analysis Featured Publications ICS Industrial control system

3 Trends in Support of a More Nuanced Approach to ICS Security

The security community has seen multiple high-profile incidents targeting industrial control systems (ICS) over the past few years. No one can forget Christmas 2015, when a threat actor linked to the Russian government sent spear-phishing emails to the Western Ukrainian power company Prykarpattyaoblenergo.Those messages were laced with BlackEnergy, a form of
Publish At:2017-03-27 12:15 | Read:952 | Comments:0 | Tags:Featured Articles ICS Security ics malware security

Malware posing as Siemens PLC application is targeting ICS worldwide

Findings of the MIMICS project conducted by Dragos Threat Operations Center show a malware posing as Siemens PLC application is targeting ICS worldwide. After the disclosure of the Stuxnet case, the security industry started looking at ICS malware with increasing attention. A malware that infects an industrial control system could cause serious damages and p
Publish At:2017-03-26 01:15 | Read:872 | Comments:0 | Tags:Breaking News Hacking Malware BlackEnergy Havex ICS malware

The Subversive Six – Hidden Risk Points in Your ICS

I was lucky enough to be at the event at which Sean McBride initially spoke about potatoes. Who doesn’t love a good potato? It was actually a succinct outline of a process in agriculture that takes place every day, outlining pinch points of a potato harvester that could illicit physical harm to the workers performing their everyday jobs.It was a nice metapho
Publish At:2017-03-15 05:05 | Read:1106 | Comments:0 | Tags:Featured Articles ICS Security ics organization risk

68% of Oil and Gas Organizations Have Suffered a Digital Attack, Reveals Report

A new report reveals that 68 percent of oil and gas organizations have experienced at least one digital attack.In the Siemens-sponsored The State of Cybersecurity in the Oil & Gas Industry: United States (PDF), Ponemeon Institute surveyed 377 individuals based in the United States who are responsible for overseeing digital risk to their organization̵
Publish At:2017-02-27 10:30 | Read:1034 | Comments:0 | Tags:Latest Security News ics IT OT

A simulation shows how a ransomware could hack PLCs in a water treatment plant

The security researchers at the Georgia Institute of Technology have simulated a ransomware-based attack on PLCs in a water treatment plant. The security researchers at the Georgia Institute of Technology have conducted an interesting research on the potential impact of ransomware on industrial control systems (ICS). The researchers David Formby, a Ph.D. stu
Publish At:2017-02-14 10:40 | Read:909 | Comments:0 | Tags:Breaking News Hacking Security critical infrastructure extor

ICS Sandbox: Diving into the ICS Threat Landscape at RSA Conference

During the second week of February, information security professionals will head over to San Francisco to attend RSA, one of The State of Security’s top 13 conferences for 2017. The conference is primarily focused on information security-related topics and typically draws over 45,000 attendees per year, making it one of the largest information security
Publish At:2017-02-02 01:45 | Read:1086 | Comments:0 | Tags:Featured Articles ICS Security Conference ics security

Top 10 State of Security Articles of 2016

With 2016 coming to a close, The State of Security wanted to give our readers an overview of some of the most interesting, educational, and standout blogs from the year to help fill the time between eating holiday treats and celebrating the New Year.6 Stages of Network Intrusion and How to Defend Against ThemIn June, David Bisson wrote up an article around a
Publish At:2016-12-29 23:50 | Read:1302 | Comments:0 | Tags:Off Topic Hacker ics NERC CIP Phishing ransomware scam

2016 Reflections on ICS Security

As the year approaches the end, it is a time to reflect on 2016 and industrial control systems (ICS) security. Why ICS security? Because securing ICS should be everyone’s concern. Consider the impact on this critical infrastructure and what it means to you.ImpactWhy?Your entertainment—watching movies on your TV or laptop, listening to music, etc.ICS are a cr
Publish At:2016-12-28 10:55 | Read:993 | Comments:0 | Tags:Featured Articles ICS Security backdoor ics security spear-p

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud