-
OT Intent-Based Security Policies
Digital TransformationWhen implementing security on the plant floor, the friction between IT and OT is mischaracterized as a problem of “control”. The solution depends on two factors – visibility and automation.
Read More -
Vulnerability Spotlight: Multiple Vulnerabilities in Moxa EDR-810 Industrial Secure Router
Threat ResearchThese vulnerabilities were discovered by Carlos Pacho of Cisco Talos Today, Talos is disclosing several vulnerabilities that have been identified in Moxa EDR-810 industrial secure router. Moxa EDR-810 is an…
Read More -
From Box to Backdoor: Discovering Just How Insecure an ICS Device is in Only 2 Weeks
Threat ResearchInspired by “From LOW to PWNED,” we decided to take a look at one Industrial Control System (ICS) wireless access point and see just how many vulnerabilities we could find
Read More -
IEC 104 Protocol Detection Rules
Threat ResearchIEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and
Read More -
HAVEX Proves (Again) that the Airgap is a Myth: Time for Real Cybersecurity in ICS Environments
Digital TransformationThe HAVEX worm is making the rounds again. As Cisco first reported back in September 2013, HAVEX specifically targets supervisory control and data acquisition (SCADA), industrial control system (ICS), and
Read More