Black Hat: The Future of Securing Power Grid Intelligent Devices

Black Hat: The Future of Securing Power Grid Intelligent Devices

Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs). Using the IEC 62351 standard for monitoring industrial networks, ...
TRITON Framework Leveraged at a Second Critical Infrastructure Facility

TRITON Framework Leveraged at a Second Critical Infrastructure Facility

Researchers have discovered that malicious actors leveraged the TRITON framework at a second critical infrastructure facility. In this particular attack, the threat actor maintained access to the target corporate networks for nearly ...
Nozomi-Networks-Labs-Enhances-Radamsa-for-Safer-ICS-Software

Nozomi Networks Labs Enhances Radamsa for Safer ICS Software

Nozomi Networks Labs is committed to conducting cyber security research that makes industrial organizations more secure. Our latest project involves enhancing Radamsa, an open source fuzzing tool for testing software. Our new ...
Nozomi-Networks-Labs-Sharing-Valuable-ICS-Cyber-Security-Research

Nozomi Networks Labs: Sharing Valuable ICS Cyber Security Research

Over the past few years our company has been focused on product development and building our team, but we also began to contribute research to the ICS security community. Today we’re formally ...
Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

Hopefully the title of this blog has gotten your attention. In one of my prior blogs, ICS Cybersecurity: Visibility, Protective Controls, Continuous Monitoring – Wash, Rinse, Repeat, we talked about how the ...

USB Threats to Cybersecurity of Industrial Facilities

Industrial facilities cybersecurity is very critical for the national security of every state and comes once more into focus following the recent Honeywell’s Industrial USB Threat Report. With increasing pressure to limit ...
SEC-T 0x0B: Steve Miller - Reversing the TriStation Network Protocol

Reverse Engineering Proprietary ICS Protocols

One of the highlights at this year's SEC-T conference in Stockholm was Steve Miller's talk titled 'Reversing the TriStation Network Protocol'. In this talk Steve covered his quest to better understand the ...
Triton Malware Exploited Flaw

Triton Malware Exploited Zero-Day Flaw in Schneider Electric Safety Controllers

Schneider Electric has confirmed that a recently uncovered malware program that was used to attack industrial infrastructure exploited a vulnerability in its Triconex safety controllers. The malware, dubbed Triton, was uncovered in ...
Security Boulevard