skip to Main Content

the Industrial Control Systems Cyber Emergency Response Team received and responded to 245 incidents reported by asset owners and industry partners.

"The Energy Sector led all others again in 2014 with the most reported incidents" Please find the report here https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf "Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other…

Read More
Operation Dragonfly Imperils Industrial Protocol

Operation Dragonfly Imperils Industrial Protocol

By  ,  on Jul 02, 2014
Reblogged with permission orginal article here http://blogs.mcafee.com/mcafee-labs/operation-dragonfly-imperils-industrial-protocol

Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be focused on espionage (at least for now), and the scope of the attack appears to be considerably broader than that of Stuxnet.

Read More

The Cyber Senate announces two international Industrial Control Cyber Security meetings to address Critical National Infrastructure threats

  Key Government, Oil and Gas, Electric and Water Utilities have agreed to share  professional and collective insight at two conferences, being held back to back in London,  Kingdom and Sacramento California, to address security threats surrounding industrial  and process automation systems,…

Read More
Back To Top