FEATURE - The Insider Threat OT Infrastructure
10.08.18

The Insider Threat in OT Infrastructure

It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, ...

Read more
FEATURE-FLYINGBLINDISNOWAYTOSECUREYOUROTNETWORK - NEW
09.13.18

Flying Blind Is No Way to Secure Your OT Network

A recent SANs survey polled more than 200 security professionals from energy and utilities, oil and gas, and manufacturing organizations. Less than 5% of those ...

Read more
FEATURE - TRITON UNWRAPPED_ INDEGY LABS ANALYSIS
08.14.18

Triton Unwrapped; Indegy Labs Analysis

In December 2017 a sophisticated ICS attack known as “Triton” had been published. This attack manipulated the Triconex Safety Instrumented System (SIS) controll...

Read more
FEATURE - Filtering the Facts on VPN Filter
08.01.18

Filtering the Facts on VPNFilter

Just recently an attack known as VPNFilter hit the news. One of the locations affected by VPNFilter was a chlorine plant known as “Aul Chlorotransfer Station” i...

Read more
FEATURE-ISMALWAREHIDINGINYOURICSNETWORK_- NEW
05.14.18

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptoc...

Read more
FEATURE-TRITON MALWARE_INDUSTRIALCONTROLLERSARENOLONGER SAFE ATTACKS
12.21.17

TRITON Malware: Industrial Controllers are No Long...

Recently, a new malware variant, called TRITON, specifically designed to attack industrial safety systems was identified as being responsible for causing an ope...

Read more
FEATURE - Petya The Ransomware That can Wipe Out Your ICS Automation Systems and Files
07.03.17

Petya: The Ransomware That Can Wipe Out Your ICS A...

 On June 27, 2017, a new malware variant named “Petya” (also known as “NotPetya” or “Nyetya”) began affecting Microsoft Windows personal computers (PCs) around ...

Read more
FEATURE-DETECTINGANDMITIGATINGCRASHOVERRIDE - NEW
06.30.17

Detecting and Mitigating CRASHOVERRIDE: ICS-Tailor...

Recently, researchers exposed ‘CRASHOVERRIDE’ (a.k.a. Industroyer) a malware that was used in an ICS cyber attack that disrupted an insecure electrical grid in ...

Read more

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy