Industrial Control Systems

ICS news

Attack on a Red Hat GitLab instance hits 28,000 repos
  

Attack on a Red Hat GitLab instance hits 28,000 repos

Data stolen from 800 orgs, including big names such as Bank of America, Verizon, the NSA, and Kaiser Permanente.SCM feed

Oracle confirms its E-Business Suite customers received extortion emails
  

Oracle confirms its E-Business Suite customers received extortion emails

While Oracle said customers received extortion emails, it did not tie the case to Clop, which reportedly claimed responsibility.SCM feed

Confucius threat group shifts tactics from infostealers to backdoors
  

Confucius threat group shifts tactics from infostealers to backdoors

The group also shifted from malicious PowerPoint files to LNK attachments for initial access.SCM feed for Endpoint/Device SecurityRead More

7 Practical Steps to Secure Multi-AI Deployments for IoT and ICS/SCADA
  

7 Practical Steps to Secure Multi-AI Deployments for IoT and ICS/SCADA

Artificial Intelligence isn’t just transforming business, it’s reshaping how industries compete. Finance, healthcare, retail, energy and manufacturing are all racing to

Backlash triggers deletion of stolen Kido nursery chain data
  

Backlash triggers deletion of stolen Kido nursery chain data

Information belonging to over 8,000 children and families stolen from global nursery chain Kido has been removed by the newly

Third-party breach impacts Renault UK customer info
  

Third-party breach impacts Renault UK customer info

HackRead reports that Renault UK had its customers’ data stolen following a cyberattack against a third-party service provider.SCM feed for

RCE weakness found in DrayTek Vigor routers
  

RCE weakness found in DrayTek Vigor routers

Multiple DrayTek Vigor routers were confirmed to have been impacted by the security issue, tracked as CVE-2025-10547, which could be

Cybersecurity allegations settled by Georgia Tech
  

Cybersecurity allegations settled by Georgia Tech

The Georgia Institute of Technology has agreed to a $875,000 settlement to resolve Georgia Tech Research Company’s alleged violations of

Qilin lays claim on Israel’s Shamir Medical Center
  

Qilin lays claim on Israel’s Shamir Medical Center

Major Israeli government hospital Shamir Medical Center was claimed to have been compromised by the Qilin ransomware operation in an

HackerOne bug bounties increase
  

HackerOne bug bounties increase

BleepingComputer reports that HackerOne’s bug bounty programs have granted $81 million to ethical hackers around the globe during the past

Study warns free VPN apps pose severe risks
  

Study warns free VPN apps pose severe risks

Multiple cybersecurity weaknesses have been plaguing free VPN software on Android and iOS, potentially jeopardizing corporate and personal data, according

Reduced cybersecurity training adopted by Pentagon
  

Reduced cybersecurity training adopted by Pentagon

The U.S. Defense Department, recently renamed as the Department of War, has rolled back cybersecurity training as it focuses on

AI just changed the rules of cyber. Did your stack get the memo?
  

AI just changed the rules of cyber. Did your stack get the memo?

AI turned cyber on its head — most security stacks are still fighting trebuchets with castles.SCM feed for Endpoint/Device SecurityRead

Okta’s new mission: Managing AI agents for the future workforce
  

Okta’s new mission: Managing AI agents for the future workforce

One of Okta’s primary goals is to use identity management to control and secure AI agents in the workplace, a

Three mobile AppDev privacy risks – and how testing catches them in advance
  

Three mobile AppDev privacy risks – and how testing catches them in advance

Here’s why security teams need enhanced application testing to catch issues before they leave production.SCM feed for Endpoint/Device SecurityRead More

  

NIST publication warns that USB devices pose serious cybersecurity threats to ICS, offers guidance for mitigation

The U.S. National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), finalized… The post

  

ENISA 2025 Threat Landscape report highlights EU faces escalating hacktivist attacks and state-aligned cyber threats

The European Union Agency for Cybersecurity (ENISA) reports in its 2025 Threat Landscape that the EU remains a… The post

  

Businesses and manufacturing bear brunt of 36% ransomware spike, as government and healthcare see declines

New data from Comparitech reported 5,186 ransomware attacks so far in 2025, a 36% increase compared with 3,810… The post

  

CyberSheath finds only 1% of defense contractors fully prepared for CMMC audits, warns of compliance gaps across DIB

CyberSheath’s fourth annual State of the DIB report reveals that just 1% of defense contractors feel fully prepared… The post

New ‘point-and-click’ phishing kit simplifies malicious attachment creation
  

New ‘point-and-click’ phishing kit simplifies malicious attachment creation

Impact Solutions provides features to disguise file types, perform ClickFix attacks and more.SCM feed for Endpoint/Device SecurityRead More