TRITON Framework Leveraged at a Second Critical Infrastructure Facility

Researchers have discovered that malicious actors leveraged the TRITON framework at a second critical infrastructure facility. In this particular attack, the threat actor maintained access to the target corporate networks for nearly a year before gaini… Continue reading TRITON Framework Leveraged at a Second Critical Infrastructure Facility

Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Threatpost talks to Phil Neray with CyberX about Tuesday’s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more. Continue reading Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack

Nozomi Networks Labs Enhances Radamsa for Safer ICS Software

Nozomi Networks Labs is committed to conducting cyber security research that makes industrial organizations more secure. Our latest project involves enhancing Radamsa, an open source fuzzing tool for testing software.
Our new code makes it faster and e… Continue reading Nozomi Networks Labs Enhances Radamsa for Safer ICS Software

Nozomi Networks Labs: Sharing Valuable ICS Cyber Security Research

Over the past few years our company has been focused on product development and building our team, but we also began to contribute research to the ICS security community.
Today we’re formally introducing Nozomi Networks Labs, whose goal is to hel… Continue reading Nozomi Networks Labs: Sharing Valuable ICS Cyber Security Research

Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

Hopefully the title of this blog has gotten your attention. In one of my prior blogs, ICS Cybersecurity: Visibility, Protective Controls, Continuous Monitoring – Wash, Rinse, Repeat, we talked about how the malicious threat landscape for industri… Continue reading Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

USB Threats to Cybersecurity of Industrial Facilities

Industrial facilities cybersecurity is very critical for the national security of every state and comes once more into focus following the recent Honeywell’s Industrial USB Threat Report. With increasing pressure to limit network access to indust… Continue reading USB Threats to Cybersecurity of Industrial Facilities