Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today

“The End of the World!?!” That’s what the cover of TIME Magazine said for its January 18, 1999 issue.  Over two decades ago, the industrialized world was gripped by panic over the so-called Y2K bug. Also called the Millennium Bug, the year 2000 problem, Y2K problem, the Y2K glitch and other labels, some feared the […]

The post Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today appeared first on Security Intelligence.

Continue reading Blast From the Past: What the Y2K Bug Reveals About Cybersecurity Today

[SANS ISC] “Open” Access to Industrial Systems Interface is Also Far From Zero

I published the following diary on isc.sans.edu: “‘Open’ Access to Industrial Systems Interface is Also Far From Zero“: Jan’s last diary about the recent attack against the US pipeline was in perfect timing with the quick research I was preparing for a few weeks. If core components of industrial systems

The post [SANS ISC] “Open” Access to Industrial Systems Interface is Also Far From Zero appeared first on /dev/random.

Continue reading [SANS ISC] “Open” Access to Industrial Systems Interface is Also Far From Zero

SightCall raises $42M for its AR-based visual assistance platform

Long before Covid-19 precipitated “digital transformation” across the world of work, customer services and support was built to run online and virtually. Yet it too is undergoing an evolution supercharged by technology. Today, a startup called SightCall, which has built an augmented reality platform to help field service teams, the companies they work for, and […] Continue reading SightCall raises $42M for its AR-based visual assistance platform

Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Over the weekend, the Alpharetta, GA based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information technology (IT) and industrial operational technology (OT) systems. Simply put, an all-too-common ransomware event tar… Continue reading Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

From Triton to Stuxnet: Preparing for OT Incident Response

Lesley Carhart, with Dragos, gives Threatpost a behind-the-scenes look at how industrial companies are faring during the COVID-19 pandemic – and how they can prepare for future threats. Continue reading From Triton to Stuxnet: Preparing for OT Incident Response

3 Zones that Require Network Security for Industrial Remote Access

By now, we have a good understanding of what secure remote access (SRA) is and why organizations might choose to enable it for their OT environments. We also know that securing IT-OT collaboration, leveraging guidance from best practice frameworks and … Continue reading 3 Zones that Require Network Security for Industrial Remote Access

New ‘MontysThree’ Toolset Used in Targeted Industrial Espionage Attacks

Researchers uncovered a new toolset they’ve dubbed “MontysThree” that has played a role in targeted industrial espionage attacks stretching back to 2018. In the summer of 2020, Kaspersky Lab discovered that an unknown actor had been using a modular C++… Continue reading New ‘MontysThree’ Toolset Used in Targeted Industrial Espionage Attacks

Critical Industrial Flaws Pose Patching Headache For Manufacturers

When it comes to patching critical flaws, industrial firms face various challenges – with some needing to shut down entire factories in order to apply updates. Continue reading Critical Industrial Flaws Pose Patching Headache For Manufacturers