#operational-technology

[ follow ]
#cybersecurity
Russo-Ukrainian War
fromComputerWeekly.com
2 months ago

Reflecting on three years of cyber warfare in Ukraine | Computer Weekly

The Russian invasion of Ukraine has significantly transformed the global cyber security landscape, impacting tactics and frequency of cyber threats.
Information security
fromTheregister
7 months ago

Despite attacks, water security standards still a pipe dream

Multiple countries are targeting U.S. water infrastructure, highlighting significant vulnerabilities in critical systems reliant on outdated technology.
Information security
fromSecuritymagazine
1 month ago

Chinese threat actor resided in US electric grid for almost one year

The Volt Typhoon intrusion highlights increasing cyberattack sophistication against critical infrastructure, stressing the need for foundational cyber defense capabilities.
Information security
fromThe Hacker News
4 months ago

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

Iran-affiliated actors developed IOCONTROL malware targeting IoT and OT environments to compromise critical infrastructure in Israel and the US.
fromSecuritymagazine
5 months ago
Information security

Always-on defense: The critical role of monitoring in manufacturing cyber protection

Manufacturing's shift to interconnected systems under Industry 4.0 heightens vulnerability to cyber threats, necessitating improved cybersecurity measures.
Russo-Ukrainian War
fromComputerWeekly.com
2 months ago

Reflecting on three years of cyber warfare in Ukraine | Computer Weekly

The Russian invasion of Ukraine has significantly transformed the global cyber security landscape, impacting tactics and frequency of cyber threats.
Information security
fromTheregister
7 months ago

Despite attacks, water security standards still a pipe dream

Multiple countries are targeting U.S. water infrastructure, highlighting significant vulnerabilities in critical systems reliant on outdated technology.
Information security
fromSecuritymagazine
1 month ago

Chinese threat actor resided in US electric grid for almost one year

The Volt Typhoon intrusion highlights increasing cyberattack sophistication against critical infrastructure, stressing the need for foundational cyber defense capabilities.
Information security
fromThe Hacker News
4 months ago

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

Iran-affiliated actors developed IOCONTROL malware targeting IoT and OT environments to compromise critical infrastructure in Israel and the US.
fromSecuritymagazine
5 months ago
Information security

Always-on defense: The critical role of monitoring in manufacturing cyber protection

Manufacturing's shift to interconnected systems under Industry 4.0 heightens vulnerability to cyber threats, necessitating improved cybersecurity measures.
more#cybersecurity
fromComputerWeekly.com
3 months ago
Information security

CNI operators should ask these 12 questions of their OT suppliers | Computer Weekly

Prioritizing security in operational technology is essential for critical national infrastructure amid rising cyber threats.
[ Load more ]