Nokia introduces AI tool for OT environments
Nokia is introducing a suite of generative AI tools named MX Workmate. In this way, it aims to support employees in industrial (OT) environments in real-time, especially with troubleshooting and repairing machinery problems.
With the introduction of its suite of generative AI tools, MX Workmate,... Read more
Cyber attack knocks out four Australian ports, 30,000 containers stuck
DP World had a weekend to forget in Australia. After cyber attackers struck on Friday, the shipping giant was forced to shut down multiple ports. It also disconnected from the Internet to fight off the hackers. For now, the perpetrators are unknown.
A spokesman for DP World states that 5,000 con... Read more
CVSS 4.0 vulnerability scoring system incorporates OT, ICS and IoT
The global vulnerability scoring system is getting a new version after eight years. CVSS 4.0 includes a focus on the cybersecurity of OT, ICS and IoT.
CVSS 4.0 has been officially released by the Forum of Incident Response and Security Teams (FIRST). The scoring system is mostly known under the... Read more
Secior and Forescout enter strategic partnership for holistic security approach
Partnership to link Forescout's solutions with Secior's services.
Secior and Forescout let us know that they have entered into a strategic partnership. With this, both the established security player Forescout and the Dutch start-up Secior take important steps on the Dutch and European market.
... Read more
Honeywell buys OT and IoT security company SCADAfence
Honeywell has acquired Israel-based SCADAfence. Its OT and IoT security technology will be integrated into Honeywell's solutions for securing industrial environments and systems.
With the acquisition, no financial details of which were disclosed, Honeywell gains security solutions that can monit... Read more
Microsoft discovers vulnerabilities that could bring down a power plant
Microsoft researchers have discovered fifteen vulnerabilities in the CODESYS V3 software development kit. After several steps, it is possible for malicious actors to carry out a denial-of-service attack, even if it is difficult to accomplish.
The CODESYS tool handles industrial automation and is... Read more
Zero Trust must be a pivotal part of OT security
IT security is on the radar of many companies, who have implemented that quite well, argues Arjan Aelmans of Fortinet. That does not apply to OT security, though. Why is that? And how do you go about it properly? A conversation about ISA/IEC 62443, the Purdue model, Zero Trust, Fortinet's Security ... Read more
Microsoft Defender for IoT soon to scan Linux devices
Microsoft is releasing the new Firmware Analysis feature for Defender for IoT. Soon, the software will be able to read Linux devices in your enterprise environment for vulnerabilities.
Firmware Analysis for Defender for IoT scans Linux devices for different types of vulnerabilities, ranging fro... Read more
Vulnerabilities in critical infrastructure could have massive consequences
Researchers have discovered vulnerabilities in TETRA, which provides radio communications around the globe for police, ambulance traffic, the military, power grids and trains, among others.
The vulnerabilities can be used by malicious parties to cause extensive damage. TETRA is an abbreviation ... Read more
Splunk aims to simplify OT security with Edge Hub hardware
At its own .conf23 event in Las Vegas, Splunk has announced a new OT product. The Splunk Edge Hub can streamline data gathering from sensors, IoT devices and industrial tools. A striking move, given that other security players don't choose to invest in hardware.
Splunk originally specialized in ... Read more