It has become some sort of a running gag in the cybersecurity communication that operational technology (OT) networks and industrial control systems (ICS) are notoriously insecure. However, most reports on this are limited to assumptions and general warnings.
In the first part of this post we already introduced a Network Intrusion Detection Systems (NIDS) as a solution for mitigating ransomware attacks on Operational Technology (OT).
Ransomware attacks are the number one cyber risk to industrial companies and critical infrastructure worldwide.
Klaus Mochalski, Rhebo: “there is no 100% security, and adversaries are always a few steps ahead” | CyberNews
Recommendation aims to provide fast mitigation for vulnerable organizations
The Log4Shell vulnerability in Log4j threatens all the cornerstones of cybersecurity: availability, integrity and confidentiality.
Renewable energy installations (EEAs) are a potential target for faults simply because of their distance from the control center.
The IT Security Act 2.0 was passed. Critical infrastructures have to set up an attack detection system within two years.
In a substation of a large distribution system operator Rhebo Industrial Protector had detected suspicious behavior.
Rhebo strengthens ICS cybersecurity of German Thüringer Energienetze
Detect Zero Day Attacks before it is too late? We show with a practical example which approach will protect you the most.
We show how malware like EKANS can disrupt processes in your ICS and what it needs to be prepared even for unknown threads.
Results from past and current projects where Ripple20 communication vulnerabilities were found.
If employees use their work computers to access the Internet via the home network, even a secure VPN for the connection to the company won't help.
During a Rhebo Industry 4.0 stability and security audit, it became apparent that several network participants were unsuccessfully attempting to establish connections.
Established security systems cannot detect many attack strategies - especially if they are novel or use seemingly authorized paths.
When it comes to network security, many operators of critical infrastructures think primarily of protection at the perimeter. However, you never know what is going on inside the network.