Protecting Industrial Control Systems Against Cyberattacks - Part 3

Protecting Industrial Control Systems Against Cyberattacks – Part 3

In the third installment of our series, Protecting Industrial Control Systems Against Cyberattacks, we explore additional risk factors and vulnerabilities facing ICS SCADA systems. If you haven’t already, please go back and ...
Virsec Analysis of the Colonial Pipeline Attack

Virsec Analysis of the Colonial Pipeline Attack

The Colonial Pipeline attack on Saturday, May 5th, 2021 represents another in a series of advanced cyber threats, and one of the most serious incidents targeting supervisory control and data acquisition (SCADA) ...
Protecting Industrial Control Systems Against Cyberattacks - Part 2

Protecting Industrial Control Systems Against Cyberattacks – Part 2

Industrial Control Systems (ICS) are the foundation that support numerous industries around the world. They form the backbone of industrialized society, including energy and power grids, food and beverage plants, oil and ...
Iran

Businesses Warned of Iran Cyberattacks

Iran vowed revenge after a U.S. airstrike ordered by President Donald Trump killed the country’s top general Qasem Soleimani earlier this month. While recent missile strikes conducted by Iran against U.S. bases ...
Security Boulevard
Dell Technologies VMware backup and recovery

BlackEnergy Successor Hits Energy Companies Since 2015

For the past three years, a stealthy cyberespionage group has been targeting energy companies, primarily from Poland and Ukraine, using a new malware framework dubbed GreyEnergy. GreyEnergy is a modular malware platform ...
Security Boulevard
Cybersecurity, IBM, Cloudflare

VPNFilter Attack Hits Chlorine Plant in Ukraine

Ukraine’s internal security agency, the SBU, reports blocking a VPNFilter attack against a plant that produces liquid chlorine used for treating the water supply in the country. The SBU has not provided technical ...
Security Boulevard
New Document Attack Exploits Design Behavior Rather than Macros

New Document Attack Exploits Design Behavior Rather than Macros

Malicious Microsoft Word documents sent via email are a hacker favorite when it comes to infecting computers, but researchers have recently observed an attack campaign that uses first-stage docs without any active ...
Security Boulevard
Adobe Confirms Unpatched Flash

Adobe Confirms Unpatched Flash Player Vulnerability Used in Attacks

Adobe Systems has confirmed that attackers are in possession of an exploit for a critical zero-day vulnerability in Flash Player that will be patched over the coming days. News of the flaw ...
Security Boulevard
Triton Malware Exploited Flaw

Triton Malware Exploited Zero-Day Flaw in Schneider Electric Safety Controllers

Schneider Electric has confirmed that a recently uncovered malware program that was used to attack industrial infrastructure exploited a vulnerability in its Triconex safety controllers. The malware, dubbed Triton, was uncovered in ...
Security Boulevard
Dragonfly Cyberspy Group Ramps Up Attacks Against Energy Sector

Dragonfly Cyberspy Group Ramps Up Attacks Against Energy Sector

Symantec warns that a sophisticated cyberespionage group known as Dragonfly is aggressively targeting companies from the energy sector in Europe and the United States. The company’s researchers have seen evidence that in ...