A renowned ICS/SCADA security researcher has discovered a surprising twist in cyberattacks hitting plant floor networks: traditional banking Trojan malware posing as legitimate ICS software updates ...
A large number of government agencies and private organizations have SCADA (supervisory control and data acquisition) or industrial control systems (ICS). The benefits of these technologies come with ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) are releasing this joint ...
Cyber security vendor Indegy disclosed a vulnerability in a Schneider Electric software application that can be used to remotely control industrial processes at the 2016 Industrial Control Systems ...
A prominent security researcher has put together a new database of hundreds of thousands of known-good files from ICS and SCADA software vendors in an effort to help users and other researchers ...
A report on the state of SCADA and ICS security points out that critical infrastructure operators are caught between hackers and a lack of vendor and executive support. Critical infrastructure ...
Army Cyber Command has listed ICS-SCADA systems as one of five cyber defense priorities. (Maj. Ray McCulloch/Army) The Department of Defense’s cyber teams have typically defended IP-based networks, ...
Joint advisory issued by U.S. government agencies for industrial controls (Source: CISA) U.S. government agencies, including the Department of Energy, the Cybersecurity and Infrastructure Security ...
The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) yesterday released this ...
Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are critical as they are used to monitor and control the delivery of essential services such as ...
Sophisticated cyber-attacks known as Advanced Persistent Threats (APT) are a growing challenge to the energy sector of our nation’s critical infrastructure. These attacks can largely be attributed to ...
Actions to Take Today to Protect ICS/SCADA Devices: • Enforce multifactor authentication for all remote access to ICS networks and devices whenever possible. • Change all passwords to ICS/SCADA ...