Industrial Control Systems

ICS news


US GAO reports that TSA failed to address two pipeline cybersecurity related threats

The U.S. Government Accountability Office (GAO) released a report on Tuesday stating that the U.S. Department of Homeland Security’s Transportation


US legislation moves to secure critical energy infrastructure

The U.S. House of Representatives approved last week three bills that aim at strengthening cybersecurity measures in critical energy infrastructure.


DOE updates its C2M2 model to meet cyber threat challenges

The U.S. Department of Energy (DOE) released version 2.0 (v2.0) of the C2M2 model (Cybersecurity Capability Maturity Model) to meet


Russians Take Down Water Follies Hackers

The Russian government today posted a video purported to be of special operations soldiers taking out a Syrian hacker group.


CI-SOC Attacked

Gen Turgidson, the Director of the National Critical Infrastructure Security Operations Center (CI-SOC), announced this morning from the Delano City



Komoly figyelmeztetés lehet a Gartner legfrissebb jelentése azoknak, akik a céges működést biztosító rendszerek, gépek, szenzorok biztonságáért felelnek. Az amerikai


DHS industrial control legislation passed in US

The U.S. House of Representatives this week took concrete measures to bolster industrial control cybersecurity, strengthen U.S. critical supply chains,


Claroty’s Team82 strengthens security of industrial networks

Industrial cybersecurity vendor Claroty launched Team82, its research arm that provides vulnerability and threat research to customers and defenders of


FBI, CISA disclose spearphishing activity targeting US oil and natural gas pipeline companies

The Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency disclosed spearphishing activity and intrusion campaigns conducted by


US administration releases second security directive for critical pipeline owners and operators

The U.S. Department of Homeland Security’s Transportation Security Administration (TSA) division released on Tuesday its second security directive that requires


US security agencies again warn of Chinese state-sponsored cyber espionage attacks

U.S. security agencies have once again come together to release a joint cybersecurity advisory detailing various Chinese state-sponsored cyber techniques


MITRE Engenuity analyses five cybersecurity products for ability to handle Triton malware

MITRE Engenuity has announced results from its initial round of independent ATT&CK evaluations, which examined how cybersecurity products from five


Russians Seize Water Follies Attack Server

John Jay, the spokesman for the Department of Foreign Affairs, announced this morning that a foreign government had seized the


OPSWAT buys Bayshore assets enhancing its CIP capabilities to OT, ICS environments

Critical Infrastructure Protection company OPSWAT purchased on Monday all assets of Bayshore Networks to provide CIP capabilities to operational technology


DoD, DHS fail to respond to cyber threats that affect critical infrastructure environments

A U.S. Department of Defense (DoD) audit report found that the defense agency along with the Department of Homeland Security


Water Park Incident Caused by Hackers

Yesterday’s incident at the Delano Water Follies waterpark which injured 100 and killed two, was caused when large amounts of


Ransomware strikes rise sharply, fueled by profit potential

Cybercrime, including ransomware strikes, has continued to rise sharply, fueled by its potential for profit, as workforces are overwhelmed and


Hackers see big bucks in OT infrastructure, cloud adoption picks up

Attackers are essentially running a criminal business, and it seems like they are waking up to the fact that the


US to reward informants of foreign malicious cyber activity against critical infrastructure

The U.S. Department of State announced on Thursday that its Rewards for Justice (RFJ) program will now deal with foreign


Critical vulnerability in Schneider Electric Modicon PLCs can bypass authentication mechanisms

Researchers from security firm Armis have detected the presence of a bypass vulnerability in Schneider Electric’s Modicon PLCs, which allows


Delano Airport Hack Was Proof-of-Concept Demonstration

Yesterday, three instrument landings at the Porter Alexander Airport in Delano, GA were canceled as the Airport experienced problems with


KLCERT-20-025: Rockwell Automation ISaGRAF Runtime: Information Disclosure due to Hard-coded Cryptographic Key

ISaGRAF Runtime and ISaGRAF Workbench use Tiny Encryption Algorithm (TEA) algorithm with fixed keys to encrypt transmitted passwords over IXL


KLCERT-20-024: Rockwell Automation ISaGRAF Runtime: Code Execution due to Uncontrolled Search Path Element

ISaGRAF Runtime for Microsoft Windows searches its directory for all files that have extension “.dll” and loads them as dynamic


KLCERT-20-023: Rockwell Automation ISaGRAF Runtime: Information Disclosure due to Cleartext Transmission of Information over IXL protocol

Data transferred over IXL protocol is unencrypted. An attacker could read and modify all data transferred between ISaGRAF Workbench and