Industrial Control Systems

ICS news

  

Kritikus infrastruktúra védelmi labor Veszprémben

Az OPSWAT múlt héten megnyitotta Magyarország első, kritikus infrastruktúrára szakosodott kiberbiztonsági központját Veszprémben. Az új veszprémi CIP laboratóriumban az OPSWAT

IBM says it can run its quantum algorithm on AMD chips
  

IBM says it can run its quantum algorithm on AMD chips

Experts agree this news may move the market, but worry that quantum computing will make public-key encryption obsolete.SCM feed for

AI assistant data exposure likely with new Shadow Escape zero-click attack
  

AI assistant data exposure likely with new Shadow Escape zero-click attack

Organizations leveraging widely adopted artificial intelligence assistants could be subjected to extensive data compromise, impacting Social Security numbers, financial information,

Data breach impacts Toys “R” Us Canada customers
  

Data breach impacts Toys “R” Us Canada customers

Toys “R” Us Canada has confirmed the legitimacy of customer data exposed by a threat actor in late July, BleepingComputer

CISA adds critical Motex Lanscope Endpoint Manager bug to vulnerabilities list
  

CISA adds critical Motex Lanscope Endpoint Manager bug to vulnerabilities list

Ongoing attacks involving the critical improper source verification of a communication channel flaw in Motex Lanscope Endpoint Manager, tracked as

Comcast data exposed by Medusa ransomware gang
  

Comcast data exposed by Medusa ransomware gang

HackRead reports that U.S. multinational media and telecommunications conglomerate Comcast Corporation had 186.36 GB of compressed data, amounting to 834

US rejection of UN cybercrime treaty sought
  

US rejection of UN cybercrime treaty sought

The U.S. has been urged by the Foundation for Defense Democracies to reject a proposed United Nations cybercrime treaty meant

Why we need prevention at scale to stop the AI ghouls
  

Why we need prevention at scale to stop the AI ghouls

When security teams are focused on detection, bad actors will use AI to move right past them.SCM feed for Endpoint/Device

Report: Cybersecurity leaders see AI as partial fix to burnout
  

Report: Cybersecurity leaders see AI as partial fix to burnout

Many burned-out cybersecurity leaders were noted by a Red Canary survey to perceive artificial intelligence as both a lifeline and

L3Harris executive allegedly sold stolen trade secrets
  

L3Harris executive allegedly sold stolen trade secrets

TechCrunch reports that the Department of Justice has charged former L3Harris executive Peter Williams over the alleged theft of eight

  

OPSWAT sets up advanced cyber lab in Hungary to strengthen critical infrastructure defense

OPSWAT, a global vendor of critical infrastructure protection solutions, last week opened Hungary’s first dedicated cybersecurity center for… The post

  

Darktrace expands ActiveAI platform with unified threat detection, autonomous investigations to close gaps

Darktrace, vendor of AI for cybersecurity, announced on Thursday a wave of innovations across its ActiveAI Security Platform… The post

  

Agenda ransomware abusing remote access, backup tools to escalate attacks on critical infrastructure in 2025

Trend Micro researchers identified the Agenda ransomware group, also known as Qilin, deploying a Linux-based ransomware binary on… The post

  

Trellix reports nation-state espionage and AI-driven financial attacks converging, as industrial sector most targeted

A new Trellix report outlines an evolving threat landscape fueled by AI adoption, insider threats, and critical vulnerability… The post

  

Infinigate UK&I partners with TXOne Networks to boost OT Zero Trust security for industrial environments

Infinigate UK&I has announced a new partnership with TXOne Networks, vendor of operational technology (OT) security and a… The post

  

Marlink: Over 40% of maritime systems remain on Windows 10 ahead of end-of-support, heightening cyber risk

New data from Marlink reveals that a significant portion of vessels in the maritime sector are still operating… The post

Overcoming 5 Challenges in Industrial Edge Security
  

Overcoming 5 Challenges in Industrial Edge Security

Edge computing has revolutionized productivity and efficiency for manufacturing facilities. However, its broad coverage and interconnectedness also leave it vulnerable

AI browser risks demonstrated by PoC sidebar spoofing attack
  

AI browser risks demonstrated by PoC sidebar spoofing attack

A browser extension could imitate an AI sidebar and provide malicious instructions.SCM feed for Endpoint/Device SecurityRead More

Its Always DNS – PSW #897
  

Its Always DNS – PSW #897

SCM feed for Endpoint/Device SecurityRead More

Many companies say they haven’t assessed agentic AI risks
  

Many companies say they haven’t assessed agentic AI risks

While nearly 60% of respondents plan to use agentic AI, more than half have not assessed the risks.SCM feed for

  

Forescout warns TP-Link router vulnerabilities could expose industrial systems, provides mitigations

New data from Forescout Technologies reveals two critical vulnerabilities in TP-Link  Omada and Festa VPN routers, which are… The post

RedTiger infostealer targeting gamers and Discord accounts
  

RedTiger infostealer targeting gamers and Discord accounts

Malware’s rich feature set expected to have broader appeal to threat actors.SCM feed for Endpoint/Device SecurityRead More

Typosquatted Nethereum package seeks to pilfer crypto wallet keys
  

Typosquatted Nethereum package seeks to pilfer crypto wallet keys

Intrusions exfiltrating cryptocurrency wallet keys have been facilitated by a malicious package impersonating the widely used Ethereum .NET integration platform