Topic: industrial control systems

  • Controlled Chaos: Safely Breaking Industrial Systems

    Controlled Chaos: Safely Breaking Industrial Systems

    Researchers developed a container-based framework that safely simulates industrial control systems (ICS) for cybersecurity testing without disrupting physical operations. The system uses Docker containers to replicate essential ICS components, enabling realistic attack simulations and adaptable c...

    Read More »
  • Dragos Platform 3.0: Fastest Path to OT Cybersecurity

    Dragos Platform 3.0: Fastest Path to OT Cybersecurity

    The Dragos Platform 3.0 introduces new capabilities to help industrial defenders by consolidating alerts into a prioritized view and streamlining workflows for faster value realization. It features an Insights Hub for centralized risk-weighted summaries and AI-enhanced vulnerability management to...

    Read More »
  • Poland's Energy Grid Breached Via Exposed VPN

    Poland's Energy Grid Breached Via Exposed VPN

    In late 2025, a Russia-aligned cyber group targeted Poland's critical infrastructure, exploiting a common vulnerability in internet-exposed Fortinet VPN devices without multi-factor authentication to gain initial access for destructive operations. The attacks primarily focused on renewable energy...

    Read More »
  • NCSC Warns of Severe Cyber-Attacks on Critical Infrastructure

    NCSC Warns of Severe Cyber-Attacks on Critical Infrastructure

    The UK's National Cyber Security Centre (NCSC) has issued an urgent warning to critical national infrastructure providers, citing severe and disruptive cyber-attacks as a present danger, following incidents like those against energy networks in Poland. These sophisticated threats aim to cause hig...

    Read More »
  • Google Warns of Rising Cyber-Physical Attacks in Europe

    Google Warns of Rising Cyber-Physical Attacks in Europe

    Google Cloud Security forecasts a major increase in cyber-physical attacks on Europe's critical infrastructure by 2026, targeting sectors like energy, transportation, and digital systems, which threatens public safety and economic stability. State-sponsored cyber espionage from countries such as ...

    Read More »
  • 10 AI Risks That Could Devastate 2026

    10 AI Risks That Could Devastate 2026

    The cybersecurity landscape in 2026 will be defined by the weaponization of AI, leading to faster, more adaptive, and harder-to-detect threats that demand a shift from reactive to proactive defense strategies. Key emerging threats include autonomous, AI-enabled malware that evades detection, agen...

    Read More »
  • Crack Weak Admin Passwords in 12 Hours with Mandiant's New Tool

    Crack Weak Admin Passwords in 12 Hours with Mandiant's New Tool

    Mandiant has released a free, public database that can crack passwords protected by the outdated NTLMv1 hash algorithm in under 12 hours using consumer hardware, dramatically lowering the barrier for attackers. The tool is a precomputed rainbow table hosted on Google Cloud, enabling the quick rev...

    Read More »