Industrial Systems Emergency Response Team is a special Kaspersky project that will offer the wide range of information services, starting from the intelligence on the latest threats and security incidents with mitigation strategies and all the way up to incident response and investigation consultancy and services. In addition to the latest intelligence about threats and vulnerabilities, Kaspersky’s Industrial CERT will share expertise on compliance. Being a non-commercial project, ICS CERT will share information and expertise to its members free of charge.
Vulnerability in FortiGate VPN servers is exploited in Cring ransomware attacks
07 April 2021
APT attacks on industrial companies in 2020
29 March 2021
Threat landscape for industrial automation systems. Statistics for H2 2020
25 March 2021
Threat landscape for the ICS engineering and integration sector. 2020
17 March 2021
Lazarus targets defense industry with ThreatNeedle
25 February 2021
SunBurst industrial victims
26 January 2021
More ReportsAre industrial organizations a target for cybercriminals?
01 December 2020
Kaspersky ICS CERT goes virtual with the Deggendorf Institute of Technology!
24 November 2020
Kaspersky conducts ICS digital forensics and incident response training course in China
30 January 2020
Applied industrial cybersecurity by Kaspersky at the Deggendorf Institute of Technology
25 November 2019
7th Kaspersky Industrial Cybersecurity Conference
01 November 2019
Kaspersky Industrial CTF 2019 Finals Results
29 April 2019
More EventsGood old buffer overflow
31 March 2021
Network Asset Traversal or NATural disaster: NAT Slipstreaming 2.0
30 March 2021
More critical vulnerabilities identified in OPC protocol implementations
04 March 2021
Classics: vulnerabilities in web console and third-party components in Pepperl+Fuchs IO-Link-Master gateways
09 February 2021
Getting back on Treck: more vulnerabilities in the infamous TCP/IP Stack
05 February 2021
Much ado about the certificate: what one should know about Siemens SCALANCE X switch configuration to avoid MitM
02 February 2021
More NewsVulnerability in FortiGate VPN servers is exploited in Cring ransomware attacks
07 April 2021
APT attacks on industrial companies in 2020
29 March 2021
Threat landscape for industrial automation systems. Statistics for H2 2020
25 March 2021
Threat landscape for the ICS engineering and integration sector. 2020
17 March 2021
Lazarus targets defense industry with ThreatNeedle
25 February 2021
SunBurst industrial victims
26 January 2021
More ReportsKLCERT-17-029: Authentication bypass in Rockwell Automation Logix controllers
02 March 2021
KLCERT-20-017: Session Information Exposure in ARC Informatique PcVue
09 October 2020
KLCERT-20-016: Denial-of-Service in ARC Informatique PcVue
09 October 2020
KLCERT-20-015: Remote Code Execution in ARC Informatique PcVue
09 October 2020
KLCERT-20-014: Session token exposed in Honeywell ControlEdge PLC and RTU
23 June 2020
KLCERT-20-013: Unencypted password transmission in Honeywell ControlEdge PLC and RTU
23 June 2020
More AdvisoriesPercentage of industrial computers attacked, March 2021
Top countries by percentage of industrial computers attacked, March 2021
Threat sources, March 2021
Malware platforms, March 2021