Posts for category: ICS Cybersecurity

British Water Facilities Breached Through ICS Exposure’s

Executive Summary  United Kingdom (UK) water suppliers have been the target of multiple cyberattacks targeting Industrial Control Systems (ICS) and Operational Technology (OT). These attacks have ...

Several Canadian ICS Systems Breached

Executive Summary Several of Canada’s Information Control Systems (ICS) have been targeted and breached by hacktivist groups. These attacks can degrade affected systems and create problems for ...

Vulnerabilities found in FUJI Electric products

Executive Summary  Vulnerabilities detected in Fuji Electric’s Human-Machine Interface (HMI) Configurator and their V-SFT product software exposing industrial organizations to cyberattacks. ...

ICS Systems Targeted often In Europe

Executive Summary  The European Union Agency for Cybersecurity (ENISA) has published a report showing Industrial Control Systems (ICS) and Operational Technology (OT) have experienced increases in ...

Protecting ICS Against USB Devices

Executive Summary  Universal Serial Bus (USB) devices pose a major threat to Industrial Control Systems (ICS). They can be used to exploit systems by introducing malware or shutting down critical ...

Unpatched Vulnerabilities in Cognex Industrial Devices

Executive Summary  Unpatched vulnerabilities in Cognex products expose affected devices to remote attacks. Exploitation can allow attackers to access sensitive information and cause critical system ...

New Cybersecurity Regulations Pose Major Shifts for ICS Operators

Executive Summary  The European Union is enforcing new cybersecurity laws that affect global industrial infrastructure. These include the Network and Information Security Directive 2 (NIS2), the ...

New Threats in Familiar Code: Open-Source Risks in ICS

Executive Summary  Open-source software (OSS) is widely used in Industrial Control Systems (ICS) to reduce development time and improve scalability. However, this reliance introduces serious ...

The MOVEit Data Breach: Understanding the Risks and Mitigation Strategies

Executive Summary In June 2023, a critical vulnerability in the MOVEit managed file transfer (MFT) software led to a large-scale data breach, exposing sensitive information from thousands of ...

The Growing Threat of Insecure Industrial Control Systems and the Importance of Multi-Factor Authentication

Executive Summary Weak authentication mechanisms cause Industrial control systems (ICS) to be susceptible to cyber threats. Successful attacks against ICS cause operational disruptions, payment ...