<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: scada

The IT/OT Challenge - Understanding Convergence Risks

As we have discussed in previous articles on our blog, smart technologies are advancing at a precedential speed. New technologies and IoT devices allow operational technology infrastructures to connect to the information technology (IT) realm, receiving data and controls from Internet-connected devices. While this creates amazing opportunities and technological advancement, such as simplified process control, real-time visibility, and decreased unplanned downtime, connecting OT devices to the Internet makes them vulnerable to an additional world of threats and attack types. Companies and facilities must strictly protect their industrial control system (ICS) and SCADA networks, since a breach can cause damage to an electrical grid, an oil rig, or even to emergency services systems during a crisis.

Read More

Share this:

The SCADA Threat

Sometimes they let me out in public to talk to people and last night was one of those occasions. Last night I attended an INSA event where various security related issues were discussed. The main speaker was Admiral Mike McConnell, the former head of the NSA and former DNI, and he said something which I greatly fear is true, particularly regarding major infrastructure.

Read More

Share this:

STUXNET fallout

Via my friends at Control Global, I've found and started to read the summary analysis of the STUXNET worm by Ralph Langner. Langner shows what looks like fairly strong circumstantial evidence that STUXNET was a deliberate cyberwar attack - presumably on the Iranian nuclear program, with possible spin offs to also affect nuclear research in other countries as well. Politically, this is fascinating stuff, but as this blog is about cyber security I prefer to look at some of the security issues it raises.

Read More

Share this:

More on the Stuxnet Siemens Exploit

Yesterday I guest blogged at Control Global about remediation steps for process automation networks and I've been thinking some more about the topic.

Read More

Share this:

Just Another Malware Monday

Today there are, as usual, a number of active botnets, zero day exploits and purveyors of miscellaneous malware. The one that has received all the publicity is the Windows LNK file exploit which seems to be designed to attack Siemens SCADA systems. Another one that popped up  on the Shadow server listserv is a new sort of malware that packed in such a way that it is not detected by any current anti-virus program - and that will mutate easily to evade the detection algorithms of most anti-virus programs.

Read More

Share this:

ARCHIVES

see all

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter