FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

By: Newsroom β€” May 22nd 2024 at 12:21
Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected to the public-facing internet to mitigate unauthorized or malicious cyber activity. The company said it's issuing the advisory due to "heightened geopolitical tensions and adversarial cyber activity globally." To that end, customers are required to take immediate
☐ β˜† βœ‡ The Hacker News

Considerations for Operational Technology Cybersecurity

By: The Hacker News β€” April 4th 2024 at 11:27
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security
☐ β˜† βœ‡ The Hacker News

Making Sense of Operational Technology Attacks: The Past, Present, and Future

By: The Hacker News β€” March 21st 2024 at 09:23
When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks? Answering that would require breaking down the different types of OT cyber-attacks and then looking back on all the
☐ β˜† βœ‡ The Hacker News

High-Severity Flaws Uncovered in Bosch Thermostats and Smart Nutrunners

By: Newsroom β€” January 15th 2024 at 08:16
Multiple security vulnerabilities have been disclosed in Bosch BCC100 thermostats and Rexroth NXA015S-36V-B smart nutrunners that, if successfully exploited, could allow attackers to execute arbitrary code on affected systems. Romanian cybersecurity firm Bitdefender, which discovered the flaw in Bosch BCC100 thermostats last August, said the issue could be weaponized by an attacker to
☐ β˜† βœ‡ The Hacker News

Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile Strikes

By: Newsroom β€” November 10th 2023 at 12:22
The notorious Russian hackers known asΒ SandwormΒ targeted an electrical substation in Ukraine last year, causing a brief power outage in October 2022. The findings come from Google's Mandiant, which described the hack as a "multi-event cyber attack" leveraging a novel technique for impacting industrial control systems (ICS). "The actor first used OT-level living-off-the-land (LotL) techniques to
☐ β˜† βœ‡ The Hacker News

16 New CODESYS SDK Flaws Expose OT Environments to Remote Attacks

By: THN β€” August 11th 2023 at 05:20
A set of 16 high-severity security flaws have been disclosed in theΒ CODESYS V3Β software development kit (SDK) that could result in remote code execution and denial-of-service under specific conditions, posing risks to operational technology (OT) environments. The flaws, tracked from CVE-2022-47378 through CVE-2022-47393 and dubbedΒ CoDe16, carry a CVSS score of 8.8 with the exception of CVE-2022-
☐ β˜† βœ‡ The Hacker News

5 Things CISOs Need to Know About Securing OT Environments

By: The Hacker News β€” June 28th 2023 at 10:44
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself. Traditionally, few industrial enterprises had dedicated cybersecurity leaders. Any security decisions that arose fell to the plant and factory managers, who are highly skilled technical experts in other areas but often lack cybersecurity training or
☐ β˜† βœ‡ The Hacker News

Researchers Expose New Severe Flaws in Wago and Schneider Electric OT Products

By: Ravie Lakshmanan β€” June 20th 2023 at 19:08
Three security vulnerabilities have been disclosed in operational technology (OT) products from Wago and Schneider Electric. The flaws, per Forescout, are part of aΒ broaderΒ setΒ ofΒ shortcomingsΒ collectively calledΒ OT:ICEFALL, which now comprises a total of 61 issues spanning 13 different vendors. "OT:ICEFALL demonstrates the need for tighter scrutiny of, and improvements to, processes related to
☐ β˜† βœ‡ The Hacker News

5 Reasons Why IT Security Tools Don't Work For OT

By: The Hacker News β€” June 6th 2023 at 11:44
Attacks on critical infrastructure and other OT systems are on the rise as digital transformation and OT/IT convergence continue to accelerate. Water treatment facilities, energy providers, factories, and chemical plants β€” the infrastructure that undergirds our daily lives could all be at risk. Disrupting or manipulating OT systems stands to pose real physical harm to citizens, environments, and
☐ β˜† βœ‡ The Hacker News

Beyond Traditional Security: NDR's Pivotal Role in Safeguarding OT Networks

By: The Hacker News β€” April 20th 2023 at 11:56
Why is Visibility into OT Environments Crucial? The significance of Operational Technology (OT) for businesses is undeniable as the OT sector flourishes alongside the already thriving IT sector. OT includes industrial control systems, manufacturing equipment, and devices that oversee and manage industrial environments and critical infrastructures. In recent years, adversaries have recognized the
❌