|

ICS


Cybersecurity Experts Warn of New ‘Hardened’ ICS-Specific Ransomware Variant

A primitive but unique ransomware variant that emerged in mid-December can forcibly stop a number of processes, including multiple items related to industrial control system (ICS) operations, industrial cybersecurity firm…


Air-Gapped Industrial Control Networks: What You Need to Know
cybersecurity

Many networks across a variety of verticals including government, military, financial services, power plants, and industrial manufacturing have been so-called “air-gapped.” This means they are physically and logically isolated from…


Using Extreme Visibility to Protect Industrial Control Systems [PODCAST]
the-power-podcast

What does it mean to have “extreme visibility” in an operational technology (OT) environment? According to Claroty, a New York-based company that offers cybersecurity products for industrial control systems, it’s…


TRITON/TRISIS Cyberattacker Has a New Target: Power Sector

XENOTIME, a cyberthreat activity group thought responsible for TRISIS/TRITON malware attacks on safety instrumented systems (SIS) at an oil and gas Middle Eastern facility in 2017, has been probing power company…


Modifying Behavior to Protect Systems in a Malicious Threat Landscape

The malicious threat landscape for industrial control systems (ICSs) is constantly evolving and getting more sophisticated, thereby raising the need to have visibility, implement protective controls, and perform continuous monitoring.…