Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

Posts by tag

news

117 posts
  • Threats & Vulnerabilities

Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine

  • Tyler Wall
  • May 26, 2022
In April 2020, Israel suffered a cyberattack on their water facilities were lucky enough to avoid the consequences. The threat actors attempted to hack into the industrial control systems (ICS) of five Israeli Water Authority…
Share
Courtesy: Brett Sayles
Read More
    • Threats & Vulnerabilities

    Throwback Attack: DDoS attacks are born in the Big Ten

    • Gary Cohen
    • May 20, 2022
    Every insidious and pervasive menace plaguing society has to begin somewhere. As more and more devices are connected to networks and information is shunted to the cloud, industrial cyberattacks continue to rise. Sophos’ recent State…
    Share
    Courtesy: CFE Media and Technology
    Read More
      • Threats & Vulnerabilities

      A rise in ransomware leaves businesses looking for answers

      • Tyler Wall
      • May 18, 2022
      Ransomware attacks have plagued the cybersecurity industry for years, and they’re coming at an increasing rate. In late April, Sophos, a software security company, released data and analysis from a survey on the state of…
      Share
      Read More
        • Threats & Vulnerabilities

        Throwback Attack: Careto malware attacks more than 30 countries

        • Christina Miller
        • May 12, 2022
        The world has been full of threats in the past couple of years. We have seen potential wars, actual invasions, a worldwide pandemic and so much more. It is hard to keep track of it…
        Share
        Courtesy: CFE Media
        Read More
          • Threats & Vulnerabilities

          The Colonial Pipeline cyberattack exposed the soft underbelly of U.S. critical infrastructure

          • GlobalData
          • May 11, 2022
          It has been one-year since the high-profile ransomware attack on energy pipeline operator Colonial Pipeline, which led to widespread fuel shortages along the East Coast. Add to that the later news that the U.S. Department…
          Share
          SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
          Read More
            • Networks

            IDS developed for industrial control systems

            • Southwest Research Institute
            • May 3, 2022
            Southwest Research Institute has developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems. SwRI funded the research to address emerging cyber threats in the…
            Share
            Read More
              • Threats & Vulnerabilities

              Throwback Attack: Ethical hackers take down a Google office building

              • Gary Cohen
              • April 28, 2022
              While much of cybersecurity focuses on protecting information technology (IT) systems, data and intellectual property, digital transformation has changed the game. As more systems are connected to the internet through the Industrial Internet of Things…
              Share
              Back door to a building.
              Read More
                • Threats & Vulnerabilities

                Throwback Attack: Russian APT group Turla has hit 45 countries since 2004

                • Christina Miller
                • April 22, 2022
                Since Russia made its initial incursion into Ukraine, the world has been wondering where the superpower will strike next. However, the next strike likely won’t be a physical attack, but rather will occur in the…
                Share
                Read More
                  • Threats & Vulnerabilities

                  Throwback attack: The Equation Group, ‘God of cyberespionage’

                  • Christina Miller
                  • April 8, 2022
                  President Biden recently spoke out about cybersecurity concerns, demonstrating that the world is on high alert for impending threats. It has been a national priority to strengthen cybersecurity for the past year, especially due to…
                  Share
                  Courtesy: Brett Sayles
                  Read More
                    • Facilities

                    Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

                    • Christina Miller
                    • March 10, 2022
                    As the current conflict between Russia and Ukraine worsens, U.S. agencies have advised that there could be Russian malware originally designed to target Ukraine that leaks to other countries, including the U.S. and NATO allies.…
                    Share
                    SUBSCRIBE

                    GET ON THE BEAT

                    Keep your finger on the pulse of top industry news

                    SUBSCRIBE TODAY!
                    VULNERABILITY PULSE
                    • Berkeley Internet Name Domain (BIND) - May 19, 2022
                    • Mitsubishi Electric - May 19, 2022
                    • Apache - May 16, 2022
                    • CISA - May 16, 2022
                    • Joint Cybersecurity Advisory - May 17, 2022

                    RECENT NEWS

                    • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
                    • Will CISA recommend securing industrial control systems?
                    • How to implement layered industrial cybersecurity in volatile times
                    • Throwback Attack: DDoS attacks are born in the Big Ten
                    • Improve two-factor authentication system security

                    EDUCATION BEAT

                    Introduction to Cybersecurity within Cyber-Physical Systems

                    Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

                    REGISTER NOW!
                    HACKS & ATTACKS
                    • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
                    • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
                    • Minimizing the REvil impact delivered via Kaseya servers
                    • Key takeaways from 2020 ICS-CERT vulnerabilities
                    Industrial Cybersecurity Pulse

                    Copyright 2022 CFE Media and Technology.
                    All rights reserved.


                    BETA

                    Version 1.0

                    • Content Partners
                    • Contact Us
                    • Privacy Policy
                    • Terms and Conditions

                    Input your search keywords and press Enter.

                    By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
                    Manage consent

                    Privacy Overview

                    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
                    Necessary
                    Always Enabled
                    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
                    Non-necessary
                    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
                    SAVE & ACCEPT