Trend Micro’s Zero Day Initiative (ZDI) will bring industrial control system (ICS) hacking into the Pwn2Own competition. The categories will be based on how widely used the system is and the relevance to researchers and the ICS community.
The nonprofit group Open Privacy Research Society recently publicized that the confidential medical and personally identifiable information (PII) of patients across Vancouver, Canada, is being leaked through the paging systems of hospitals in the area. What do
The hacking group Xenotime, reported to be behind intrusions targeting facilities in oil and gas industries, has started probing industrial control systems (ICSs) of power grids in the U.S. and the Asia-Pacific region.
Security researchers uncovered an additional intrusion by the threats actors behind 2017's TRITON malware, a dangerous and potentially destructive malware that targets the safety systems of industrial facilities.
Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape.
A review of the first half of 2018 shows a threat landscape that not only has constant and familiar features but also has morphing and uncharted facets: Ever-present threats steadily grew while emerging ones used stealth.
Security researchers reported several vulnerabilities in ICS routers commonly used in vital infrastructures, such as water and electricity generation and distribution.
Rockwell Automation released a firmware update for its MicroLogix 1400 programmable logic controllers (PLCs) to resolve a potentially serious vulnerability.
TRITON or TRISIS (detected by Trend Micro as TROJ_TRISIS.A) is a recently discovered malware that was designed to manipulate industrial safety systems and most notably was involved in shutting down an industrial plant’s operations.