11 Apr 2019

Triton ICS Malware Hits A Second Victim

FireEye researchers say that they have detected a second attack involving the highly disruptive Triton (aka Trisis) malware. Triton is considered to be incredibly dangerous as it is capable of remotely disabling safety systems. In the summer of 2017, Triton malware shut down a petrochemical plant in Saudi Arabia. The

Read More
09 Apr 2019

NATO launches cyber-defense drill simulating elections under attack

On Tuesday, NATO’s Cooperative Cyber Defence Centre of Excellence is launching Locked Shields 2019, a massive four-day defense exercise held in Estonia in which over 1,000 cybersecurity experts will be defending a fictional country from highly disruptive cyberattacks on critical infrastructure while elections are taking place. In addition to NATO’s

Read More
08 Apr 2019

Nine in 10 CNI Providers Damaged by Cyber-Attacks

A new report by the Ponemon Institute and Tenable highlights the growing cyber threat to critical infrastructure. The survey found that a whopping 90% of critical infrastructure providers suffered a cyberattack resulting in a data breach and/or downtime in the last two years, while 62% experienced multiple attacks. About 1

Read More
28 Mar 2019

Nearly Half of ICS Devices Protected by Kaspersky Targeted in 2018

New research by Kaspersky Labs highlights the rise of cyberattacks on industrial control systems (ICSs). Last year, 47.2% of ICS devices were at the receiving end of one or more cyberattacks, while this number was 44% in 2017. In the second half of 2018, the malicious activity affecting ICS devices

Read More
21 Mar 2019

Nation-States Have Right to Hack Back, Survey Says

A new Venafi survey taken at RSA 2019 shows that the vast majority of cybersecurity professionals (87%) consider cyber-war a reality and almost 3 out of 4 (72%) experts agree that nation-states may “hack back” in response to a cyberattack targeting critical infrastructure. Alex Hamerstone of TrustedSec expected even more

Read More
19 Mar 2019

Hacked tornado sirens taken offline in two Texas cities ahead of major storm

The latest worrisome example of the vulnerability of critical infrastructure to cyberattacks comes from Texas, where an unknown threat actor last week managed to hack into a total of 30 tornado emergency sirens in two towns, and subsequently set off the alarms in the middle of the night. As a

Read More
12 Mar 2019

Vulnerabilities in industrial Ethernet switches allow for credential theft, denial-of-service attacks

Researchers with Positive Technologies have uncovered serious security vulnerabilities in industrial Ethernet switches manufactured by Moxa. The flaws can enable threat actors to take control of switches through brute-force attacks, or to take switches down by launching denial-of-service attacks. Attacks on the switches can have major consequences since they are

Read More
11 Mar 2019

Triton is the world’s most murderous malware, and it’s spreading

In the summer of 2017, a petrochemical plant in Saudi Arabia experienced a worrisome security incident that cybersecurity experts consider to be the first-ever cyberattack carried out with “a blatant, flat-out intent to hurt people.” The attack involved a highly sophisticated new malware strain called Triton, which was capable of

Read More
11 Mar 2019

Venezuela’s Maduro Says Cyber Attack Prevented Power Restoration

In the midst of Venezuela’s presidential crisis, a country-wide blackout that began last Thursday has plunged the nation further into chaos. As of Sunday night, power had not been restored and international experts warned that it could take quite some time before the situation would improve. While international analysts argue

Read More
07 Mar 2019

New CISA director outlines top 5 priorities for protecting U.S. critical infrastructure

Christopher Krebs, the head of the newly formed Cybersecurity and Infrastructure Security Agency (CISA) that is part of the US Department of Homeland Security (DHS) has outlined 5 priorities for how the agency plans to protect critical infrastructure. The first priority is to prevent tech firms from hostile countries such

Read More