Iran Targets ICS… 🇮🇷

Iran Targets ICS… 🇮🇷

Sky News managed to obtain 60 pages comprising five internal reports all marked “very confidential” that seem to originate from the Islamic Revolutionary Guard Corps' (IRGC) Shahid Kaveh, a secret…
Schneider Electric PLC Bug

Schneider Electric PLC Bug

A vulnerability discovered in Schneider Electric's Modicon PLC could allow a remote attacker to gain total and undetectable control over the chips, leading to remote code execution, malware installation and…
PHILIPS VUE Pacs Critical Flaw

PHILIPS VUE Pacs Critical Flaw

Multiple security vulnerabilities have been disclosed in Philips Clinical Collaboration Platform Portal, some of which could be exploited by an adversary to take control of an affected system. Successful exploitation…
USB Malware Still a concern for ICS

USB Malware Still a concern for ICS

The number of cyber threats designed to use USB sticks and other external media devices as launching pads doubled in 2021.79% could be used to disrupt operational technology systems. A…
LineStar Breach

LineStar Breach

A group identifying itself as Xing Team belived to be a Chinese group that follow mount locker encryption technique last month posted to its dark web site a collection of…
Critical Flaws in CODESYS

Critical Flaws in CODESYS

Cybersecurity disclosed as many as ten critical vulnerabilities impacting CODESYS automation software that could be exploited to remote code execution on programmable logic controllers (PLCs). To exploit this only network…
Eaton Disrupts Power

Eaton Disrupts Power

Eaton’s IPM solution is designed to ensure system uptime and data integrity by allowing organizations to remotely monitor, manage and control the uninterruptible power supply (UPS) devices on their network.…