Cyber Threats in the Pharma Industry: Johnson & Johnson Experiencing OT & IT Attacks
As each day passes, so does the increasing amount of security risks with the cybersecurity attack vector. Every organization can easily fall victim to another cyber threat, but recently, the...
Takeaways for Security Leaders From The Oldsmar Water Attack
Over the last few days, cybersecurity journalists and the ICS security community have been discussing the Oldsmar Florida water system cyber attack, almost ad nauseam. While many people have been...
Preventing Ransomware Attacks On Industrial Networks
Ransomware Slams Westrock & Other Industrial Networks Earlier this week, the operations at $17 billion packaging firm WestRock were disrupted by a ransomware attack that impacted both its IT and OT...
Discovery of DoS Vulnerability in ABB's AC500 V2
Our Researchers Discover Another Vulnerability As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities...
Thank You 2020 - It's Been Quite A Ride!
2021: What a year! What a year this has been to humanity, an epidemic has fundamentally changed the way we interact with one another, social distancing, lockdowns and restrictions in virtually...
SolarWinds: Should Enterprises Adopt Supply Chain Certification
SunBurst - The Cyber Attack on SolarWinds SunBurst is a cyber espionage campaign that leveraged a supply chain attack on SolarWinds, a leading supplier of network management software. Between March...
SCADAfence Defended a DoD Supplier from Over 50 Cyber-Attackers
The '85 Bears of Cyber Physical Security A few days ago, our elite cybersecurity team of defenders, faced over 50 of the world’s top hackers and security practitioners in the Hack the Building event.
Cocktail Book: Raise Your Drinks & Your OT / IoT Security Posture
In today's stressful times, we can all use a refreshing beverage. Seriously, with the uncertainty around the the rising ransomware incidents in OT networks, we can all use some brightness in our...
SCADAfence Researchers: CVE-2020-16849 Vulnerability in Canon Printers
SCADAfence Researchers Discover A Sensitive Information Leak Vulnerability in Canon Printers
DoS Vulnerability in Mitsubishi Electric MELSEC iQ-R Series
Our Researchers Discover Another Vulnerability As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities...
The OT & IoT Cybersecurity Feed - October 2020
Hey, I’m SCADAGirl. I'm a cybersecurity superhero that ensures that OT & IoT networks are safe. Here is my commentary on the latest headlines in OT & IoT security.
Managing Your Unmanageable OT and IT Infrastructure
As industrial systems become increasingly connected to IT, Cloud and ERP systems, they become increasingly exposed to cyber threats such as ransomware. In fact, cyber threats for industrial control...
Governance - 3rd Party Application & Free Onboarding Until 2021!
It’s true, the SCADAfence Governance Portal can now connect to any third-party application through Syslog or rest-API and we’re providing the entire on-boarding for free until the end of this year....
Siemens S7 PROFINET - A Shocking Network Architecture Flaw
A Shocking Flaw Here’s an all too often overlooked item in the security architecture of industrial networks. Below is a diagram of an industrial network architecture we’ve seen in a number of places.
OT & IoT Cybersecurity Feed
Hey, I’m SCADAGirl. I'm a cybersecurity superhero that ensures that OT & IoT networks are safe. Here is my commentary on the latest headlines in OT & IoT security.
Stuxnet and Vulnerabilities In Schneider Triconex SIS Controllers
Overview As the NSA urges companies to secure their industrial networks, two vulnerabilities were found in Schneider Electric Triconex SIS devices. Both of the vulnerabilities reside within the ...
SigRed: A Wormable Microsoft DNS Server RCE Vulnerability
SigRed Overview SigRed is a vulnerability that was exposed yesterday (July 14th 2020) by the security firm Check Point. Successful exploitation of the vulnerability could lead to a malicious actor...
Ripple20: Mixed Results in SCADAfence's Exploitability Lab Tests
As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities and attack techniques. Ripple20 are 19...
SCADAfence Researchers: Vulnerability in Mitsubishi Electric MELSEC iQ-R Series CPU DoS
As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities and attack techniques. CVE-2020-13238 is a...
Iranian Hackers Target Israel’s Water Supply - Prevent Attacks
Iran Launches Cyber Attacks on Israeli Water Facilities According to a Fox News report, Iranian cyber attackers used American servers to launch their attacks on the Israeli water infrastructure...
CVE-2020-12117 & Industrial IoT Insecure Default Configurations
A New Moxa Vulnerability is Detected As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities and attack...
“Dark_Nexus” - Adversaries Compete To Control IoT Devices
The IoT Attack Landscape In a recent blog post, I wrote about the fertile ground of insecure IoT devices, and their use by adversaries such as cybercriminals and defense organizations such as...
Business Continuity for Manufacturing During a Disaster
Business continuity planning (BCP) is the process involved in the creation of a system that prevents potential threats to a company, and also aids in its recovery.
Russia’s FSB Develops Hacking Tools For IoT Devices
The Russian Government Hacking IoT Devices… Again A recent Forbesarticlereports that the Russian Federal Security Service (FSB), is using an external contractor to develop exploits and attack tools...
COVID-19 Outbreak - We’re Here To Help!
The Implications Of Coronavirus The implications of the Coronavirus strain (COVID-19), which emerged in Wuhan, China, have a significant and detrimental effect on the global economy and our ability...
The Next WannaCry Is Here & There’s No Patch Available Yet
What Does It Mean For Critical Infrastructure, Manufacturing & Building Management Systems? Co-written by Ofer Shaked and Maayan Fishelov
SNAKE / EKANS Ransomware: Deploying OT-Oriented Malware
Until now, the use of malware specifically designed to attack industrial control systems has been confined to fairly rare high-level nation-state attacks such as those which targeted nuclear...
ODVETA Ransomware as Seen by OT Security Experts
Co-written by Ofer Shaked and Maayan Fishelov Background Odveta is a ransomware that has been observed in multiple industrial networks. It doesn’t have an automated propagation mechanism, and it is...
SCADAfence Experiences Substantial Company Growth in 2019
2019 OT Security Summary & 2020 Predictions As the ritual dictates with every end of a year, we try to look back on the past year’s achievements as well as try to foresee what the future holds, or at...
Proactive Protection for OT Systems has Arrived
SCADAfence and CyberArk have together developed a proven method for protecting utilities and manufacturing facilities from external attackers by blocking malicious access to critical OT production...
BMS Systems: The Security Risks of Building Management Systems
An Intro to Building Management Systems (BMS) Before we dive into it, a Building Management System (BMS), a.k.a. “Smart Building Technology,” is an intelligent microprocessor-based controller network...
New Orleans & UK Government Slammed by Cyberattacks
New Orleans & UK Government Slammed by Cyberattacks
OT Security Platform Preventing Cyber Attacks
Prevent Incidents rather than Handling Them
Ransomware Attack At Mexico’s Pemex Could Have Been Avoided
RYUK Ransomware Cripples Mexico’s State-Owned Oil & Gas Company
Proud To Be A Member Of The OT Cyber Security Alliance
As the global technology leaders in OT Security, we’re very proud to be founding members of a new alliance that provides technical and organizational frameworks for safe and secure operational...
Strengthen Your Security: Embrace Industry 4.0 Securely
Strengthening your Industry 4.0 Cybersecurity Posture The fourth industrial revolution is all about connectivity. While many manufacturers and industrial network operators want to take advantage...
Firewalls Have Proven to be Far From Impenetrable
No single solution can offer a silver bullet for cybersecurity. Nevertheless, vital facilities such as power stations and manufacturing plants are currently in danger of relying too heavily on...
5G Causing Attack Vulnerability Global Industries & Utilities?
What is 5G technology?
Protect Networks with Scadafence’s New Release Version 5.9
SCADAfence’s New Release Version 5.9, Offers Best-In-Class Detection With The Lowest False Positives Rates.