15 May 2025
Threat landscape for industrial automation systems. Q1 2025The percentage of ICS computers on which various types of malware spread via the internet and email were blocked increased for the first time in two years.
Filter
15 May 2025
Threat landscape for industrial automation systems. Q1 2025The percentage of ICS computers on which various types of malware spread via the internet and email were blocked increased for the first time in two years.
22 November 2022
ICS cyberthreats in 2023 – what to expectCybersecurity incidents were plentiful in 2022, causing many problems for industrial infrastructure owners and operators. Below we share some of our thoughts on potential developments of 2023, though we cannot claim to be providing either a complete picture or a high degree of precision.
23 November 2021
Threats to ICS and industrial enterprises in 2022 as they are foreseen from November 2021In recent years, we have observed various trends in the changing threat landscape for industrial enterprises, most of which have been evolving for some time. We can say with high confidence that many of these trends will not only continue, but gain new traction in the coming year.
Filter
24 May 2022
Draft of the NIST Guide #800-82 – what has changedThe release of the third version of the Guide to Operational Technology (OT) Security, SP 800-82 Rev. 3, is, without a doubt, a milestone. Is the third version as good as the previous ones? What has changed?
22 February 2018
3.3% of ICS computers attacked by miners during the past yearKaspersky Lab has recorded an increase in the number of attacks involving cryptocurrency miners on the infrastructure of industrial enterprises, which started in September 2017. Miners can interfere with industrial process control and threaten process stability.
12 January 2018
Industrial solutions may be affected by Spectre and Meltdown vulnerabilitiesVulnerabilities in Intel, ARM64 and AMD processors allow unauthorized access to virtual memory contents. Vulnerable devices include industrial equipment.
18 October 2017
WPA2 Vulnerabilities Can Be Used to Attack Industrial SystemsOn October 16, information on critical vulnerabilities in the WPA2 protocol, which enable attackers to bypass protection and listen to Wi-Fi traffic, was disclosed. Comments from Kaspersky Lab ICS CERT experts
Filter