operational technology

Cloud Security Alliance Advocates Zero Trust for Critical Infrastructure
Jeffrey Burt | | cloud security alliance, critical infrastructure attacks, operational technology, zero trust cybersecurity
The Cloud Security Alliance, noting the increasing cyberthreats to critical infrastructure in a highly interconnected world, released a report outlining steps organizations can take to implement zero trust policies to protect against ...
Security Boulevard

Biggest Ever DDoS is Threat to OT Critical Infrastructure
Richi Jennings | | Analyzing DDoS Attacks, application-layer DDoS attacks, Cloudflare DDoS Protection, Critical Infrastructure, critical infrastructure attack, critical infrastructure attacks, Critical Infrastructure Security and Resilience Month, cyber attack on critical infrastructure, ddos, DDoS amplification, DDoS attack, distributed denial of service, Distributed denial of service (DDoS) attacks, distributed denial of service attack, ICS, ICS/SCADA systems, industrial control systems, Infrastructure, iot, operational technologies, operational technology, operational technology security, OT, SB Blogwatch, US critical infrastructure
Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS) ...
Security Boulevard
Microsoft OT Security Vulnerabilities: Protect Devices Now
Wajahat Raja | | Attack Surface Reduction, cyber attacks, cyber hygiene, Cybersecurity, Cybersecurity News, Fuxnet Malware, ICS vulnerabilities, industrial control systems, Industrial Cybersecurity, Internet-Exposed Devices, IT-OT Segmentation, Microsoft, Microsoft Defender for IoT, Microsoft Security Advisory, operational technology, OT Device Protection, OT Network Protection, OT security, Vulnerability Management, zero trust security
In recent times, Microsoft security advisory has issued a stern warning about the pressing need to fortify the security of internet-exposed operational technology (OT) vulnerabilities on devices. This caution comes in response ...

A Major Industrial Cybersecurity Threat: Living off the Land Attacks
Nathan Eddy | | commercial infrastructure, CPS, Cyber-Physical Systems, Honeywell, ICS, industrial control systems, iot, living off the land, lotl, operational technology, USB
In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Security Boulevard
Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled
Wajahat Raja | | Aleos Application Framework, CISA Advisories, Critical Sectors, Cyber Attack Risk Assessment, Cybersecurity, Cybersecurity News, Forescout Vedere Labs, Internet of things, Network Security, open source components, OpenNDS, operational technology, patch management, perimeter devices, router vulnerabilities, security measures, Sierra Flaws Cyber Attack, Sierra Wireless, Supply Chain Risks, threat landscape, Timely Patching, TinyXML, zero-day exploits
In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...

‘Sabotage the Factory’ — 16 Big Bugs in Codesys ICS/OT/SCADA Software
Richi Jennings | | CoDe16, Codesys, ICS, ICS/SCADA, ICS/SCADA Security, operational technologies, operational technology, operational technology security, OT, SB Blogwatch, SCADA, Vladimir Eliezer Tokarev, Vladimir Tokarev
CoDe16 FAIL: Researchers unveil high-severity vulns in Codesys Control, used in millions of devices ...
Security Boulevard

“Reducing the attack surface: the key to secure your OT environment”
Deepti Sachdeva | | Artificial Intelligence, Attacksurface, CERT-In, operational technology, Securitycontrols, VAPT, zero-day
Introduction Operational technology (OT) systems are essential in various sectors, including manufacturing, energy, and transportation, in the current digital era. Real-time monitoring and control of physical processes and devices are the responsibility ...

GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol
Pascal Ackerman | | Blog, Cybersecurity, ICS, industrial control systems, Network & Infrastructure Security, operational technology, SBN News, Technical, Threat Advisory, vulnerability
What if you could no longer trust the critical process values displayed on your HMI screen? Executive Summary When operating […] ...

The Importance of ICS Cybersecurity
Pascal Ackerman | | Blog, Cybersecurity, Governance, Risk & Compliance, industrial control systems, operational technology, Penetration Testing, Vulnerability Management & Penetration Testing
For the past 25 years, I have been working with Operational Technology (OT), and for the last 10 I have […] ...

Considerations for merging your IT and OT environments into ICS
GuidePoint Security | | Blog, Cybersecurity, Governance, Risk & Compliance, ICS, industrial control systems, operational technology, OT, Penetration Testing, Security Architecture, Security Program, Vulnerability Management & Penetration Testing
Many organizations straddle the barrier between two different worlds: the Operational Technology (OT) world of physical machinery, manufacturing systems, SCADA, […] ...