Dragos
-
IIOT Cyber
Threat Actor Behind Cybersecurity Attacks Targeting Safety Instrumented Systems Identified
A relatively new cyberattack threat activity group dubbed “XENOTIME” is intent on compromising and disrupting industry safety instrumented systems globally, and cybersecurity experts are warning it is “easily the most dangerous threat activity publicly known.” According to global industrial control system (ICS) cybersecurity firm Dragos Inc., XENOTIME is behind TRISIS (also known as TRITON), the […]
-
IIOT Power
ICS Cybersecurity Threatened, but Defense Woefully Inadequate
Though increasingly serious cybersecurity threats loom, nearly two-thirds of U.S. industrial control system (ICS) vulnerabilities identified in 2017 could cause severe operational impact if exploited, cybersecurity firm Dragos Inc. warned in a series of reports published March 1. The reports, which cover ICS vulnerabilities, ICS threats, and reactions to existing threats, draw a dire picture […]
-
IIOT Power
Exercise Proves Hacking a Threat to Nuclear Power Plants
Cybersecurity is a topic covered frequently in the pages of POWER magazine, and one that all power plants need to take seriously. A recent simulation proved that the consequences of a hack can be grave. The drill took place in Sweden, but could have been conducted anywhere in the world. The attack used plant control […]
Tagged in: -
Press Releases
CrowdStrike and Dragos Inc. Partner to Drive Unmatched Cybersecurity Capabilities for Industrial Control Systems
Strategic partnership to augment customers’ ability to stop breaches and proactively detect and mitigate security risks SUNNYVALE, Calif., July 18, 2017 – CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced a joint Services go-to market partnership with Dragos, the renowned Industrial control system (ICS) cybersecurity experts. Today, CrowdStrike Services offers industry-leading cyber readiness assessments, […]
Tagged in: -
Connected Plant
Malware in Modern ICS: Understanding Impact While Avoiding Hype
Understanding the threat posed to industrial control systems (ICSs) by malware is difficult. It requires knowledge of proper ICS functionality in order to identify illegitimate software. One industrial