A Totally Tubular Treatise on TRITON and TriStation

A Totally Tubular Treatise on TRITON and TriStation

Introduction In December 2017, FireEye's Mandiant discussed an incident response involving the TRITON framework. The TRITON attack and many of the publicly discussed ICS intrusions involved routine techniques where the threat actors ...
The Black Swan: Mitigating Cyber Attacks Within ICS Environments

The Black Swan: Mitigating Cyber Attacks Within ICS Environments

ICSs are specialized resulting in limited industry expertise spanning ICS, IT, and security. In terms of mitigation techniques, most vendors and organizations leverage generic security methodologies resulting in a reactive approach. RSA ...
New Triton Malware Framework Attacks Critical Infrastructure

New Triton Malware Framework Attacks Critical Infrastructure

Security researchers have come across new malware designed to infect specialized safety controllers used in industrial infrastructure, in what is believed to be a well-funded nation state attack. The malware framework was ...
Security Boulevard
Industrial Cybersecurity: Addressing Today’s and Tomorrow’s Challenges

Industrial Cybersecurity: Addressing Today’s and Tomorrow’s Challenges

Industrial control system (ICS) cybersecurity has come a long way over the last decade. Today, we have well-established guidance for securing industrial plants and SCADA systems, including IEC-62443, NERC CIP, and the ...
The State of Security

Internet of Ships falling down on security basics

While most modern ships may not have physical leaks, they are catastrophically porous when it comes to cyber security ...
Naked Security - Sophos