ICS/SCADA
Wireless hack attacks target critical infrastructure
Critical infrastructure control systems are at risk from wireless attacks carried out over Software Defined Radio (SDR), according to Digital Assurance. Critical network …
SCADA security
Amol Sarwate is the Director of Vulnerability Labs at Qualys. In this video, recorded at RSA Conference 2013, Sarwate introduces SCADA security.
Attacking SCADA wireless systems
Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …
Who is attacking industrial control systems?
Since the discovery of Stuxnet, industrial control systems (ICS) and supervisory control and data acquisition (SCADA) networks have received a fair share of attention from …
Patching for industrial cyber security is a broken model
New research from Belden shows that patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting critical …
The SCADA security challenge
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …
Connect securely to the cloud using JSON and XMPP
At the RSA Conference 2013 in San Francisco, Express Logic and Cypherbridge Systems announced the integration of the Cypherbridge embedded secure Cloud Device Kit for Express …
Cloud computing in critical information infrastructure protection
ENISA has launched a new report looking at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective, and identifying that cloud computing is …
Critical flaw lets attackers control hospital, military buildings’ systems
A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other …
SCADA password cracking code available
ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access …
Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes …
Vulnerability of oil and gas infrastructure drives security investments
Security of critical facilities remains the topmost priority for the global oil and gas industry. Escalating demand for oil and gas, the construction of new facilities, and …
Featured news
Resources
Don't miss
- Attackers exploiting WSUS vulnerability drop Skuld infostealer (CVE-2025-59287)
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI