skip to Main Content
3rd Annual Rail Cyber Security Summit

3rd Annual Rail Cyber Security Summit

On March 13th and 14th 2018, the Cyber Senate Rail Cyber Security Summit returns to London United Kingdom to address the evolving cyber threats to global rail infrastructure. Advanced digitisation widely deployed to increase enterprise efficiencies, network optimisation, enhanced asset…

Read More

the Industrial Control Systems Cyber Emergency Response Team received and responded to 245 incidents reported by asset owners and industry partners.

"The Energy Sector led all others again in 2014 with the most reported incidents" Please find the report here https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf "Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other…

Read More
Operation Dragonfly Imperils Industrial Protocol

Operation Dragonfly Imperils Industrial Protocol

By  ,  on Jul 02, 2014
Reblogged with permission orginal article here http://blogs.mcafee.com/mcafee-labs/operation-dragonfly-imperils-industrial-protocol

Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be focused on espionage (at least for now), and the scope of the attack appears to be considerably broader than that of Stuxnet.

Read More
Back To Top