Topic: industrial control systems
-
Controlled Chaos: Safely Breaking Industrial Systems
Researchers developed a container-based framework that safely simulates industrial control systems (ICS) for cybersecurity testing without disrupting physical operations. The system uses Docker containers to replicate essential ICS components, enabling realistic attack simulations and adaptable c...
Read More » -
Dragos Platform 3.0: Fastest Path to OT Cybersecurity
The Dragos Platform 3.0 introduces new capabilities to help industrial defenders by consolidating alerts into a prioritized view and streamlining workflows for faster value realization. It features an Insights Hub for centralized risk-weighted summaries and AI-enhanced vulnerability management to...
Read More » -
Poland's Energy Grid Breached Via Exposed VPN
In late 2025, a Russia-aligned cyber group targeted Poland's critical infrastructure, exploiting a common vulnerability in internet-exposed Fortinet VPN devices without multi-factor authentication to gain initial access for destructive operations. The attacks primarily focused on renewable energy...
Read More » -
NCSC Warns of Severe Cyber-Attacks on Critical Infrastructure
The UK's National Cyber Security Centre (NCSC) has issued an urgent warning to critical national infrastructure providers, citing severe and disruptive cyber-attacks as a present danger, following incidents like those against energy networks in Poland. These sophisticated threats aim to cause hig...
Read More » -
Google Warns of Rising Cyber-Physical Attacks in Europe
Google Cloud Security forecasts a major increase in cyber-physical attacks on Europe's critical infrastructure by 2026, targeting sectors like energy, transportation, and digital systems, which threatens public safety and economic stability. State-sponsored cyber espionage from countries such as ...
Read More » -
10 AI Risks That Could Devastate 2026
The cybersecurity landscape in 2026 will be defined by the weaponization of AI, leading to faster, more adaptive, and harder-to-detect threats that demand a shift from reactive to proactive defense strategies. Key emerging threats include autonomous, AI-enabled malware that evades detection, agen...
Read More » -
Crack Weak Admin Passwords in 12 Hours with Mandiant's New Tool
Mandiant has released a free, public database that can crack passwords protected by the outdated NTLMv1 hash algorithm in under 12 hours using consumer hardware, dramatically lowering the barrier for attackers. The tool is a precomputed rainbow table hosted on Google Cloud, enabling the quick rev...
Read More »