electric grid

Oak Ridge, McCrary Institute Establish Cybersecurity Center Focused on Electrical Grid
Nathan Eddy | | Critical Infrastructure, cybersecurity research, Cybersecurity Research Center, electric grid, funding, government, university, workforce training
In addition to supporting research centers, the $12.5 million project focuses on training the next generation of cybersecurity pros to safeguard the nation's critical infrastructure. ...
Security Boulevard

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Richi Jennings | | COSMICENERGY, electric grid, electrical grid, Electrical grids, energy grid, grid cyber attack, ICS, IEC 60870-5-104, IEC-104, INCONTROLLER, Industroyer, Industroyer2, Malware, OT, power grid, Power-Grid Security, Red Team, Red team exercises, red team operations, red team testing, Red Teaming, Red Teams, red-team-tools, redteam, Russia, Russia Exodus, Russia power grid, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, russian, Russian Cyber War, SB Blogwatch, Solar Polygon, triton, TRITON ICS malware, Triton malware
Shouty name—dangerous game. Red-team tool ripe for misuse ...
Security Boulevard

Russia Tries to Kill Ukraine’s Power Grid—and FAILS
Richi Jennings | | electric grid, ICS, Industroyer, Industroyer2, power grid, Russia, Sandworm, Sandworm hackers—are they working for the Harkonnen?, SB Blogwatch, SCADA, Ukraine
Russia’s infamous Sandworm APT group is at it again: The scrotes have been trying to cut power to the Ukrainian capital ...
Security Boulevard
Is the Electric Grid Ready to Respond to Increased Cyber Threats?
Reports from the U.S. Government Accountability Office (GAO) and Siemens highlight both the increasing cyber threats faced by the electric utility companies and the lack of adequate readiness to respond to these ...

Sophisticated Malware Attack Launched via Fake SEC Emails
Lucian Constantin | | DNSMessenger, electric grid, energy companies, Malware, North Korea, Phishing, powershell, Securities and Exchange Commission
Researchers have detected a targeted attack that uses a combination of novel techniques to deploy PowerShell malware. The infection starts with malicious documents distributed through phishing emails that masquerade as messages from ...