Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

Vulnerability Pulse

Every week, we catalog the major industrial cybersecurity vulnerabilities and updates you should know about. Here are the notable threats from the week of April 24 - 30. Sign up to get these updates right to your inbox!

April 28, 2022

Delta Electronics

The Delta Electronics DIAEnergie contains vulnerabilities, such as path traversal, incorrect default permissions, SQL injection and uncontrolled search path element.

Sources:

Delta,

CISA

Johnson Controls

The Johnson Controls Metasys ADS/ADX/OAS servers contain an improper privilege management vulnerability.

Sources:

Johnson Controls,

CISA

Malware targeting Ukrainian organizations

CISA and the FBI updated the joint cybersecurity advisory on destructive malware targeting organizations in Ukraine that was released in February 2022.

Sources:

CISA,

CISA

Cisco

Cisco released security updates for multiple products that contained vulnerabilities that an attacker could use to gain control of affected systems.

Sources:

Cisco,

CISA

Google

Google released security updates for Chrome to address vulnerabilities that could lead to an attacker gaining control of affected systems.

Sources:

Google Chrome,

CISA

April 27, 2022

Top exploited vulnerabilities in 2021

CISA, the NSA, the FBI, the Australian Cybersecurity Center, the Canadian Center for Cybersecurity, the New Zealand National Cybersecurity Center and the United Kingdom’s National Cybersecurity Center released a joint cybersecurity advisory explaining the top…

Sources:

Joint cybersecurity advisory,

CISA

April 26, 2022

Hitachi Energy

The Hitachi Energy System Data Manager – SDM600 contains vulnerabilities, such as integer overflow or wraparound, reachable assertion, type confusion, uncontrolled recursion and observable discrepancy.

Sources:

Hitachi Energy,

CISA

Mitsubishi Electric

The Mitsubishi Electric MELSEC and MELIPC Series contain vulnerabilities, such as uncontrolled resource consumption, improper handling of length parameter inconsistency and improper input validation.

Sources:

Mitsubishi Electric advisory,

CISA

April 25, 2022

CISA

CISA added seven vulnerabilities to its Known Exploited Vulnerabilities Catalog.

Sources:

Known Exploited Vulnerabilities Catalog,

CISA

Posts navigation
  • « Previous
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 45
  • Next »
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT