A cyber attack on a German steel plant has been confirmed to suffer a significant amount of damage, putting the spotlight on the evident lack of security across a number of different critical facilities and institutions.
During a security evaluation of AIS, we found that both the implementation, as well as the protocol specification of AIS, is affected by several threats, from spoofing and hijacking to availability disruption.
The United States Industrial Control System Cyber Emergency Response Team recently released an advisory warning operators of industrial control systems that there is an active cyber crime campaign targeting them with Trojans and backdoor attacks.
After beginning an investigation into the affiliated malware samples and domains used by the Sandworm team, we found that the group is likely targeting SCADA-centric victims using GE Intelligent Platform’s CIMPLICITY HMI solution suite.
Ninety-six percent of enterprises think they know what targeted attack campaigns are. But studies show that more than half can't even differentiate between traditional threats and actual attacks. How far is enterprise perception on their targeted attack pr
This research paper looks at who are continuing to attack external-facing ICS devices and why, and provides attack statistics, in-depth analysis of the threat actors, and their possible motivations.
Combining SCADA and cloud computing: Are the savings substantial enough to offset the security concerns users may have if they migrate integral SCADA devices to the cloud?