Trends in the OT/ICS security space and what’s to come

In July 2021, Armis appointed Sachin Shah, an Intel veteran of over 21 years, as its new CTO for Operational Technology (OT) and Industrial Control Systems (ICS). In this interview, he talks about his plans for the company, shares insight gleaned from … Continue reading Trends in the OT/ICS security space and what’s to come

ICS vulnerabilities disclosed in H1 2021 rose by 41%

Industrial control system (ICS) vulnerability disclosures are drastically increasing as high-profile cyberattacks on critical infrastructure and industrial enterprises have elevated ICS security to a mainstream issue, according to a report released by … Continue reading ICS vulnerabilities disclosed in H1 2021 rose by 41%

Collaboration is the key to protecting critical national infrastructure

Concern around protecting critical national infrastructure (CNI) is growing. Following several high-profile attacks and growing tensions around state sponsored cyber activity, the threat landscape is only likely to intensify. Ransomware has especially … Continue reading Collaboration is the key to protecting critical national infrastructure

MITRE Engenuity launches ATT&CK Evaluations for ICS

MITRE Engenuity today released results from its first round of independent ATT&CK Evaluations for Industrial Control Systems (ICS). The evaluations examined how cybersecurity products from five ICS vendors detected the threat of Russian-linked Tri… Continue reading MITRE Engenuity launches ATT&CK Evaluations for ICS

Critical vulnerability in Schneider Electric Modicon PLCs can lead to RCE (CVE-2021-22779)

Researchers at Armis discovered an authentication bypass vulnerability (CVE-2021-22779) in Schneider Electric’s Modicon programmable logic controllers (PLCs) that can lead to remote-code-execution (RCE). Modicon M580 The vulnerability, dubbed Mod… Continue reading Critical vulnerability in Schneider Electric Modicon PLCs can lead to RCE (CVE-2021-22779)

Industrial facilities progressively at risk of data theft and ransomware attacks

Trend Micro released a new report highlighting the growing risk of downtime and sensitive data theft from ransomware attacks aimed at industrial facilities. “Industrial Control Systems are incredibly challenging to secure, leaving plenty of gaps in pro… Continue reading Industrial facilities progressively at risk of data theft and ransomware attacks

Protecting Industrial Control Systems Against Cyberattacks – Part 3

In the third installment of our series, Protecting Industrial Control Systems Against Cyberattacks, we explore additional risk factors and vulnerabilities facing ICS SCADA systems. If you haven’t already, please go back and read part 1 and part 2 … Continue reading Protecting Industrial Control Systems Against Cyberattacks – Part 3

Critical vulnerabilities identified in CODESYS ICS automation software

Researchers have identified 10 vulnerabilities in CODESYS automation software for industrial control systems. Some are of high and critical severity. “The vendor rated some of these vulnerabilities as 10 out of 10, or extremely dangerous. Their e… Continue reading Critical vulnerabilities identified in CODESYS ICS automation software

Identifying and addressing critical OT asset vulnerabilities in 24/7 industrial operations

Cybersecurity is a race. A race that has for over a decade been extended to include systems that run the world’s industrial facilities, where a breach can compromise more than data. A cyber breach at an industrial facility may enable a bad actor to mov… Continue reading Identifying and addressing critical OT asset vulnerabilities in 24/7 industrial operations

Protecting Industrial Control Systems Against Cyberattacks – Part 2

Industrial Control Systems (ICS) are the foundation that support numerous industries around the world. They form the backbone of industrialized society, including energy and power grids, food and beverage plants, oil and gas refineries, recycling … Continue reading Protecting Industrial Control Systems Against Cyberattacks – Part 2