News
Censys warns systemic exposure of Rockwell PLCs enable Iran-linked targeting of critical infrastructure OT networks
3+ hour, 45+ min ago (790+ words) Industrial Cyber Censys warns systemic exposure of Rockwell PLCs enable Iran-linked targeting of critical infrastructure OT networks Iranian-affiliated threat actors are actively targeting internet-exposed ICS (industrial control systems), with new Censys research highlighting how widely deployed Rockwell Automation Allen-Bradley PLCs…...
UK NCSC says APT28 exploits routers for DNS hijacking, enabling large-scale traffic interception
8+ hour, 16+ min ago (258+ words) We assess that APT28 is almost certainly the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Centre (GTs SS) Military Intelligence Unit 26165," the agency said in its Tuesday advisory. APT28 (also known as Forest Blizzard, Fancy Bear, STRONTIUM, the Sednit…...
CCN reports cybersecurity maturity becoming prerequisite in critical infrastructure, industrial supply chains
8+ hour, 13+ min ago (211+ words) Imran Ahmad, partner and head of technology and co-chair of cybersecurity and data privacy at Norton Rose Fulbright, said: "Legal readiness is now a condition of participation in the digital economy. Organizations that cannot demonstrate cyber preparedness and defensible governance…...
NIST SP 1331 draft guide expands CSF 2. 0 for managing emerging and emergent cybersecurity risks
7+ mon, 2+ week ago (263+ words) The publication is the latest in a series of CSF 2. 0 quick-start guides introduced since Feb. 26, 2024, offering tailored pathways for different audiences and making the Framework easier to apply in practice. The comment period is open through September 21 this year, and…...
DOE allocates $160 million to secure energy systems as cyber threats converge with grid modernization
8+ hour, 22+ min ago (797+ words) Industrial Cyber DOE allocates $160 million to secure energy systems as cyber threats converge with grid modernization The U. S. Department of Energy's FY 2027 budget frames cybersecurity as a core pillar of national energy security, embedding it directly within efforts to protect and…...
FBI reports cyber threats to critical infrastructure intensify as US cybercrime losses hit $21 billion, exposes risk
1+ day, 6+ hour ago (807+ words) Industrial Cyber FBI reports cyber threats to critical infrastructure intensify as US cybercrime losses hit $21 billion, exposes risk Data from the FBI's 2025 Internet Crime Report showed that cyber-enabled crime drained nearly US$21 billion from Americans, with cryptocurrency and AI-linked scams…...
Bitsight names John Clancy as CEO to steer growth in AI-driven cybersecurity era
1+ day, 6+ hour ago (206+ words) Steve and the team have built a powerful leadership position in the market, fueled by unmatched data, global scale, and the trust of customers around the world," said Bob Brennan, chair of Bitsight's Board of Directors. We are deeply grateful…...
Tosi reports US enterprises improve OT security maturity, but vendor access emerges as critical weakness
1+ day, 6+ hour ago (915+ words) Industrial Cyber Tosi reports US enterprises improve OT security maturity, but vendor access emerges as critical weakness OT cybersecurity firm Tosi disclosed that the average U. S. enterprise scores 35. 9 out of 50, placing the field at a "managed" Level 4, with 18% reaching the highest…...
Ongoing cyberattacks targeting internet-connected PLCs disrupt US critical infrastructure, agencies warn
1+ day, 6+ hour ago (930+ words) Industrial Cyber Ongoing cyberattacks targeting internet-connected PLCs disrupt US critical infrastructure, agencies warn U. S. cybersecurity agencies on Tuesday warned of ongoing cyber exploitation of internet-connected OT (operational technology) devices, including programmable logic controllers from Rockwell Automation and its Allen-Bradley line, deployed…...
Storm-1175 exploits web-facing systems to drive ransomware attacks across healthcare and services in US, UK, Australia
2+ day, 1+ hour ago (394+ words) Clearly, the threat actor's high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, the U. K. , and…...