Microsoft’s twice-annual SIR bellwether security report highlights malware, fraudulent login attempts and the staying power of really old software bugs.
Tag Archives: Critical Infrastructure
Linux Foundation Badge Program to Boost Open Source Security
A new CII Best Practices Badge program will help companies, interested in adopting open source technologies evaluate projects based on security, quality and stability.
Unskilled Pro-ISIS Hackers A Growing Threat
Pro-ISIS hackers promote violence and are making strides with new tools, tactics and procedures, establishing themselves as a growing threat.
Moxa Won’t Patch Publicly Disclosed Flaws Until August
A number of publicly disclosed vulnerabilities in Moxa networking gear won’t be patched until August, if at all, according to ICS-CERT.
Xen Project Explains Patch Snafu
Xen has acknowledged an oversight where it failed to provide a pair of crucial security patches in its most recent update.
Countries remain unprepared for cyberattacks on nuclear facilities
Nuclear facilities across the world have little or no real security mechanisms in place to deal with cyberattacks, according to new analysis.
The post Countries remain unprepared for cyberattacks on nuclear facilities appeared first on We Live Security.
Advantech ICS Gear Still Vulnerable to Shellshock, Heartbleed
Rapid7 disclosed that Advantech EKI industrial control gear remains vulnerable to Shellshock and Heartbleed, in addition to a host of other vulnerabilities.
Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks
Research presented during Black Hat Europe demonstrates how attackers can abuse business applications connected to ICS and SCADA gear.
Rockwell Patches Serious ‘FrostyURL’ PLC Vulnerability
Rockwell Automation has patched a handful of vulnerabilities in its Allen-Bradley MicroLogix programmable logic controllers
Unsupported Honeywell Experion PKS Vulnerable to Public Attacks
Unsupported versions of Honeywell distributed control system software are vulnerable to publicly available remote exploits.