XENOTIME, a destructive APT linked to Russia, has broadened its target set beyond Middle East oil and gas.
In only the second known attack of the Russia-linked malware, which shut down an oil refinery in 2017, another Mideast target has been hit.
Threatpost talks to Phil Neray with CyberX about Tuesday’s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.
A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more.
Straight from Black Hat 2018: How TRITON disrupted safety systems and changed the threat landscape of industrial control systems, forever.
Researchers found a critical remote code execution vulnerability afflicting two Schneider Electric products that could give attackers to disrupt or shut down plant operations.
Researchers are warning malware payloads can bypass traditional AV protection when delivered buried inside images, documents or even just a pixel.
Dewan Chowdhury, founder of MalCrawler, talks at SAS about the risks that companies face when securing their industrial control systems and robotics.
At the Security Analyst Summit this year in Cancun, FireEye’s Marina Krotofil talks about the Triton malware, first disclosed in December 2017, that targets industrial control systems.
Malware intended for a “high-impact” attack against safety systems likely would of caused physical damage to a targeted company located in the Middle East.