Tag: ICS

Architect using walkie-talkie while reading document at construction site

Flaw in Industrial IoT Controller Leaves Construction Machinery Vulnerable to Hackers

The Internet of Things (IoT) has grown exponentially over the past few years, and that growth is expected to continue into the foreseeable future. This is especially true for the Operational Technology (OT) networks, where more and more technologies are being incorporated into industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. […]

Are the Robotics in your Manufacturing Infrastructure Properly Protected?

More manufacturers than ever before are turning to automation, whether to combat rising production costs or increase productivity. Modern automation systems operate on Operational Technology (OT) networks, comprised of industrial control (ICS) and supervisory control and data acquisitions systems (SCADA). These systems are designed to operate in conjunction with each other and are quite sensitive […]

Power Plant

House Energy and Commerce Committee Passes Four Bills Focused on Securing Critical Infrastructure

On Wednesday April 18, 2018, the House of Representatives Committee on Energy and Commerce passed four bipartisan bills with the aim of improving the government’s response to cyberattacks on critical energy infrastructure. These bills come on the heels of attempts by nation states and other threat actors to access industrial control system (ICS) networks in […]

ICS Robot Protection

Researchers Create Robot to Help Protect Industrial Control Systems

Every year, more and more industrial devices come online, creating a tempting target for cybercriminals. Many of these devices were never initially meant to connect to the broader Internet or run outdated, unpatched software, making them a liability in addition to a tool to increase productivity. A team of researchers from the Georgia Institute of […]

European Water Utility Hit by Hackers

Water utility networks and control systems were recently targeted by hackers in Europe, highlighting the growing cybersecurity threat to infrastructure. The attack was of particular interest because the culprit was somewhat unusual—cryptocurrency mining software.