News

This is a archive for News.

Thursday, January 18, 2018 @ 03:01 PM gHale

By Gregory Hale
The network monitoring challenge is over and the champion is Claroty. Network monitoring, which allows visibility into what is on and what is happening on the network, is a huge area the manufacturing automation sector is moving toward, so Dale Peterson, Digital Bond chief executive who also heads up the S4 conference wanted to see how the new players in the market shaped up and are the companies and technologies living up to the hype. RELATED STORIES
S4: Lean OT Security
S4: Open-Minded Security? Just Try
ICS Alert: USB Malware

Wednesday, January 17, 2018 @ 04:01 PM gHale

By Gregory Hale
For the majority of folks working in the manufacturing automation sector, they are still at the learning and awareness levels of security – and that is a good thing. However, for security professionals winding their way through the daily maze of warding off attackers and vulnerabilities, they truly have to understand the future and understand what works today and has worked in the past, just may not fly in the future. RELATED STORIES
S4: Open-Minded Security? Just Try
ICS Alert: USB Malware Attack
Safety System, DCS Attacked
API:

Wednesday, January 17, 2018 @ 11:01 AM gHale

Boundary protection remains the biggest problem in critical infrastructure organizations, according to assessments conducted by the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). ICS-CERT conducted 176 assessments last year, which represents a 35 percent increase compared to the previous year. RELATED STORIES
ICS Alert: USB Malware Attack
Safety System, DCS Attacked
Advancing to IIoT Means Back to Security Basics
Cyber Adds to Downtime Costs: ARC-SANS The agency analyzed organizations in eight critical infrastructure sectors, but more than two-thirds of the assessments targeted the energy and water

Wednesday, January 17, 2018 @ 07:01 AM gHale

By Gregory Hale
The enormity of security can often boggle the mind. Just think about it for a moment, with trying to get a grasp of what is going on over an entire network, while trying to fend of intentional and unintentional attacks, while trying to explain why you need more funding to get to a certain level of security, while trying to figure out when to install the latest patches, the list goes on. Mind boggling. RELATED STORIES
ICS Alert: USB Malware Attack
Safety System, DCS Attacked
API: Finding Success from a

Monday, January 15, 2018 @ 05:01 PM gHale

Now the clean-up begins as the burning Iranian tanker sank in the East China Sea. A 46-square-mile oil slick consisted of heavy fuel used to power the vessel. RELATED STORIES
Iranian Oil Tanker Burns for Third Day
‘Shortcomings’ in North Sea Fatal Rig Case
Video Breaks Down KS Toxic Chem Release
Simple Process can Turn Deadly
Video Breaks Down Arkema Plant Fire The Sanchi oil tanker sank Sunday and officials said all its crew members died in the incident. The ship was carrying 136,000 metric tons of ultra-light crude oil

Friday, January 12, 2018 @ 04:01 PM gHale

Security provider FireEye paid $20 million to acquire Big Data platform provider X15 Software. Under the terms of the deal, FireEye agreed to pay $15 million in equity and $5 million in cash to acquire the privately held Sunnyvale, CA-based X15. The deal closed Thursday. RELATED STORIES
Nozomi Raises $15 Million
FL Security Providers Reach Deal
Claroty Gains RSA Certification
Leidos Loads Up Network Monitoring Partners “Organizations today are overwhelmed by alerts, the number of tools required to manage their security operations, and the challenge of unifying access to the large volumes

Friday, January 12, 2018 @ 03:01 PM gHale

An Ohio man is facing charges for creating the Fruitfly malware that went after Windows and macOS systems. Phillip R. Durachinsky, 28, of North Royalton, Ohio was indicted for 16 separate charges, including computer fraud and abuse act violations, wiretap act violations, production of child pornography, and aggravated identity theft, according to officials at the U.S. Department of Justice (DoJ). RELATED STORIES
NSA Contractor Guilty in Data Leak
2 Charged in Capital Police Camera Hack
Global Bust for ATM Skimming, Fraud
Global Effort to Dismantle Botnet Durachinsky used the malware to steal

Friday, January 12, 2018 @ 02:01 PM gHale

Advantech released a new version to mitigate additional vulnerabilities in its WebAccess, according to an updated report with ICS-CERT. The vulnerabilities include an untrusted pointer dereference, stack-based buffer overflow, path traversal, SQL injection, improper input validation, use after free, and an unrestricted upload of file with dangerous type. RELATED STORIES
WECON Clears HMI Editor Issues
New Firmware for Moxa’s MXview
Phoenix Contact Clears FL SWITCH Holes
Rockwell Clears MicroLogix Controller Hole WebAccess versions prior to 8.3 suffer from the remotely exploitable vulnerabilities, discovered by Steven Seeley of Offensive Security, Zhou Yu and

Friday, January 12, 2018 @ 01:01 PM gHale

Critical infrastructure asset owners/operators are learning about which vendors ended up affected by the cache side-channel attacks known as Meltdown and Spectre, according to a report from ICS-CERT. Exploitation of these vulnerabilities, which have case numbers of CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754, may allow unauthorized disclosure of information. RELATED STORIES
WECON Clears HMI Editor Issues
New Firmware for Moxa’s MXview
Phoenix Contact Clears FL SWITCH Holes
Rockwell Clears MicroLogix Controller Hole The following product vendors reported they support products that use affected CPUs and have issued customer notifications with recommendations for users:
ABB
More

Thursday, January 11, 2018 @ 05:01 PM gHale

WECON Technology Co., Ltd. created a new version to mitigate buffer overflows in its LeviStudio HMI Editor, according to a report with ICS-CERT. An HMI programming software product, LEVI Studio HMI Editor v1.8.29 and prior suffer from the locally exploitable vulnerabilities, discovered by Sergey Zelenyuk of RVRT, HanM0u of CloverSec Labs, and Brian Gorenc working with Zero Day Initiative. RELATED STORIES
New Firmware for Moxa’s MXview
Phoenix Contact Clears FL SWITCH Holes
Rockwell Clears MicroLogix Controller Hole
GM, Shanghai OnStar Fix iOS Client Successful exploitation of these vulnerabilities may result in arbitrary