operational technology
Securing Critical Infrastructure Against Cyber Threats
Securing critical infrastructure has never been more urgent. The FBI reported that over 40% of ransomware attacks in 2023 targeted critical infrastructure sectors, including energy, water, transportation, healthcare, communications, and financial services ...

Cloud Security Alliance Advocates Zero Trust for Critical Infrastructure
The Cloud Security Alliance, noting the increasing cyberthreats to critical infrastructure in a highly interconnected world, released a report outlining steps organizations can take to implement zero trust policies to protect against ...

Biggest Ever DDoS is Threat to OT Critical Infrastructure
Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS) ...
Microsoft OT Security Vulnerabilities: Protect Devices Now
In recent times, Microsoft security advisory has issued a stern warning about the pressing need to fortify the security of internet-exposed operational technology (OT) vulnerabilities on devices. This caution comes in response ...

A Major Industrial Cybersecurity Threat: Living off the Land Attacks
In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled
In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...

‘Sabotage the Factory’ — 16 Big Bugs in Codesys ICS/OT/SCADA Software
CoDe16 FAIL: Researchers unveil high-severity vulns in Codesys Control, used in millions of devices ...

“Reducing the attack surface: the key to secure your OT environment”
Introduction Operational technology (OT) systems are essential in various sectors, including manufacturing, energy, and transportation, in the current digital era. Real-time monitoring and control of physical processes and devices are the responsibility ...

GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol
What if you could no longer trust the critical process values displayed on your HMI screen? Executive Summary When operating […] ...

The Importance of ICS Cybersecurity
For the past 25 years, I have been working with Operational Technology (OT), and for the last 10 I have […] ...