The role of compromised cyber-physical devices in modern cyberattacks

Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attacke… Continue reading The role of compromised cyber-physical devices in modern cyberattacks

Gogoro’s battery swap GoStations help with power grid stability

Back in 2015, Gogoro proposed setting up a network of battery-swapping stations so that riders of its electric smartscooter no longer had to worry about per-charge range. Now the company operates thousands of them, and has partnered with Enel X to have… Continue reading Gogoro’s battery swap GoStations help with power grid stability

Patented algorithms predict, identify, diagnose and prevent abnormalities in complex systems

The COVID-19 pandemic has forced public health, supply chain, transportation, government, economic and many other entities to interact in real time. One of the challenges in large systems interacting in this way is that even tiny errors in one system c… Continue reading Patented algorithms predict, identify, diagnose and prevent abnormalities in complex systems

Global spending on smart cities initiatives to total nearly $124 billion in 2020

Global spending on smart cities initiatives is forecast to total nearly $124 billion this year, an increase of 18.9% over 2019, according to IDC. The top 100 cities investing in smart initiatives in 2019 represented around 29% of global spending, and w… Continue reading Global spending on smart cities initiatives to total nearly $124 billion in 2020

Hackproofing smart meters and boosting smart grid security

Smart electricity meters are useful because they allow energy utilities to efficiently track energy use and allocate energy production. But because they’re connected to a grid, they can also serve as back doors for malicious hackers. Cybersecurit… Continue reading Hackproofing smart meters and boosting smart grid security

IEC 62351 Standards for Securing Power System Communications

To help counter the growing concern about cyberattacks aiming to disrupt power systems, industrial experts have been working together in WG15. This group, part of IEC, is defining the standards known as IEC 62351, for secure-by-design power grids.
As … Continue reading IEC 62351 Standards for Securing Power System Communications

Outsmarting grid security threats

Almost two-thirds (63 percent) of utility executives believe their country faces at least a moderate risk of electricity supply interruption from a cyberattack on electric distribution grids in the next five years. The Accenture survey of more than 100 utilities executives from over 20 countries revealed interruptions to the power supply from cyberattacks is the most serious concern, cited by 57 percent of respondents. Just as worrying is the physical threat to the distribution grid. … More Continue reading Outsmarting grid security threats

Malware offers backdoor to critical infrastructure targets

SentinelOne Labs has discovered a new form of malware, which has already infected at least one European energy company. The malware, dubbed SFG, is the mother ship of an earlier malware sample called Furtim, which targets the industrial automation control systems with sophisticated malware and acts as dropper to deliver a payload which could be used to extract data or potentially shut down the energy grid. Reverse engineering SFG malware SentinelOne has reverse-engineered the SFG … More Continue reading Malware offers backdoor to critical infrastructure targets

91.1% of ICS hosts have vulnerabilities that can be exploited remotely

To minimize the possibility of a cyber attack, Industrial Control Systems (ICS) are supposed to be run in a physically isolated environment. However this is not always the case. Kaspersky Lab experts conducted an investigation into ICS threats. Their analysis was based on OSINT (Open Source Intelligence) and information from public sources like ICS CERT, with the research period limited to 2015. ICS vulnerabilities by year Experts revealed 13,698 ICS hosts exposed to the Internet … More Continue reading 91.1% of ICS hosts have vulnerabilities that can be exploited remotely