Red Balloon’s research has determined that multiple architectural vulnerabilities exist in the Siemens SIMATIC and SIPLUS S7-1500 series PLC that could allow attackers to bypass all protected boot features, resulting …
Cybersecurity
-
-
The Phoenix Contact Group has acquired the Canadian company iS5 Communications Inc. based in Mississauga, Ontario. The provider of industrial network products specializes in services and solutions for critical infrastructure …
-
CybersecurityRetarus
Email: main access channel for cyber attackers, how to protect ourselves?
by adminby adminCybersecurity in the Industry plays a more critical role every day, therefore, sensitizing the personnel who work in it about cyber attacks or preemptively blocking the countries of origin of …
-
CybersecurityeWONIndustrial Communications
Ewon Cosy+ Wireless secure remote access to industrial machines
by adminby adminWith the new Cosy+ Wireless, HMS Networks finalizes the release of the new generation of Ewon® industrial remote access gateways, bringing IIoT connectivity and cybersecurity to the next level. Featuring …
-
CybersecurityWibu-Systems
CodeMeter becomes the licensing backbone of B&R’s automation platform
by adminby adminWibu-Systems, the protection and licensing specialists from Karlsruhe, is raising a flag for a safer and more secure industrial automation world with a long-standing technological cooperation with B&R, the leading …
-
ClarotyCybersecurity
Team82 discovers vulnerabilities in Siemens S7-1200 and S7-1500 controllers
by adminby adminClose to 10 years ago, Siemens introduced asymmetric cryptography into the integrated security architecture of its TIA Portal v12 and SIMATIC S7-1200/1500 PLC CPU firmware families. This was done to …
-
CybersecurityKasperskyPLC, PAC & Controller
Kaspersky ICS CERT report on vulnerabilities in Schneider Electric’s engineering software
by adminby adminUMAS (Unified Messaging Application Services) is a proprietary Schneider Electric (SE) protocol used to configure and monitor Schneider Electric PLCs. Schneider Electric controllers that use UMAS include Modicon M580 CPU …
-
ABBCybersecurity
ABB Ability Cyber Security Workplace improve protection of industrial infrastructure
by adminby adminABB has launched ABB Ability Cyber Security Workplace (CSWP) which enhances the protection of critical industrial infrastructure by consolidating both ABB and third-party security solutions into one simple, all-encompassing digital …
-
Neglecting vulnerabilities means taking risks. Already known security vulnerabilities are one of the main entry points for cyber attacks. You need to keep on track with the vulnerabilities and react …
-
CybersecurityOmronPLC, PAC & Controller
Multiple vulnerabilities in Machine Automation Controller NJ/NX series
by adminby adminAt the beginning of the month, Omron published a series of Cybersecurity vulnerabilities on its website that affect its NJ/NX series controllers. The company details in its reports what these …
-
CybersecurityIndustrial CommunicationsOPC Foundation
Updated security analysis for the industrial protocol OPC UA
by adminby adminThe Federal Office for Information Security ( BSI ) has updated the “Security Analysis for OPC UA ( Open Platform Communications – Unified Architecture )”. The BSI study provides an …
-
CybersecurityPhoenix ContactPLC, PAC & Controller
Phoenix Contact awarded IEC 62443 certificate for PLCnext Control by TÜV SÜD
by adminby adminPhoenix Contact is the first company to receive a certification for a controller (PLC) in accordance with IEC 62443-4-1 ML 3 Full Process Profile in combination with IEC 62443-4-2. This …
-
Belden is pleased to add macmon’s talented team and its innovative technologies to its portfolio. Macmon secure GmbH is a recognized leader in advanced network access control software. Its products …
-
In this presentation, Mitsubishi Electric shows the Cybersecurity aspects to take into account in industrial automation environments and how the company integrates these solutions. Mitsubishi Electric FA have received certification …
-
CybersecurityIndustrial CommunicationsProfibus
The next steps in PROFINET Security integration
by adminby adminIndustry 4.0 applications live off of connectivity and the exchange of data between the IT and OT levels. This makes it possible to create new business models and increase productivity, …