Researchers identified 20 critical vulnerabilities in a type of Advantech industrial-grade wireless access points that is widely deployed across critical infrastructure environments. Attackers could exploit the flaws to remotely executive code and create denials of service.
Cybersecurity once conjured images of IT departments, server rooms and corporate firewalls. Today, it extends far beyond these traditional domains, becoming essential in fields like manufacturing, agriculture, healthcare, transportation, robotics and space exploration.
French multinational Schneider Electric disclosed critical vulnerabilities in its Modicon M340, Momentum and MC80 programmable automation controllers. The vulnerabilities could allow unauthorized access, data manipulation and system interruptions.
As OT systems become more interconnected, traditional air gaps disappear, creating new risks, said Joseph Carson, chief security scientist and advisory CISO at Delinea. The convergence of IT and OT environments requires a stronger focus on protecting digital identities and access controls.
Organizations mistakenly believe their operational technology systems are air-gapped and immune to cyberthreats. Dawn Cappelli, director of OT-CERT at Dragos, discusses why these assumptions are dangerous security gaps and why organizations need to rethink their approach to OT security.
Dennis Giese, a security researcher and engineer, built his first computer at around age 8 using spare parts. Years later, he hacked his first robotic vacuum cleaner. Giese reflects on his journey as a researcher and ethical hacker during HardPwn, a hardware hackathon hosted by Hardwear.io in Amsterdam.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
ISMG's Cybersecurity Pulse Report: ManuSec USA 2024 Edition is an essential resource for senior cybersecurity leaders and marketers navigating the complex landscape of operational technology security in manufacturing. This exclusive report distills critical insights from 61 industry pioneers.
Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.
Researchers demonstrated that multiple brands of EV charging stations have vulnerabilities due to manufacturers often leaving open and unsecured SSH and HTTP ports. The risks of these vulnerabilities range from an expanded attack surface to a launching pad for assaults on the power grid.
While ransomware attacks against medical devices don't happen often, disruptive cyber incidents that affect the availability of the IT systems that medical devices rely on are a big concern that needs the industry's critical attention, said Jessica Wilkerson of the FDA.
Medical device makers have become more proactive in trying to meet higher cybersecurity expectations of regulators, but many still need to better understand the importance of life cycle security risk management and related issues, said Axel Wirth of Medcrypt and Christopher Gates of Velentium.
Palo Alto Networks has been recognized as a Leader in “The Forrester Wave™: Operational Technology Security Solutions, Q2 2024” report. As we see it, the Forrester report’s recognition of our “compelling end-to-end OT security platform” underscores our dedication to providing comprehensive OT security...
The landscape of Operational Technology (OT) security is rapidly evolving, as industrial operations increasingly fall victim to frequent and devastating cyberattacks, particularly ransomware. This comprehensive guide delves into the current state of OT security, highlighting the critical challenges faced by industrial...
In this report, Enterprise Strategy Group (ESG) completed a quantitative economic analysis of Palo Alto Networks Industrial OT Security with a focus on how organizations have been able to use the service to detect, categorize and protect assets in their manufacturing and industrial OT security environments.
Read the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.