ICS vuln alert (CVSS 8.8)
Mitsubishi GENESIS64, ICONICS Suite → cleartext creds risk.
OT security gap still real.
Follow TechNadu
#Cybersecurity #ICS #OTSecurity
Latest posts tagged with #iCS on Bluesky
ICS vuln alert (CVSS 8.8)
Mitsubishi GENESIS64, ICONICS Suite → cleartext creds risk.
OT security gap still real.
Follow TechNadu
#Cybersecurity #ICS #OTSecurity
Security that isn’t operational doesn’t last.
In our latest blog, Juan Negrete explores what it takes to embed cybersecurity into daily workflows—not just policies and tools, but real operations.
Read 👉 enaxy.com/2026/04/maki...
#OTSecurity #ICS #Cybersecurity #OperationalSecurity #Enaxy
APT actors targeting PLCs → real-world disruption.
OT is now a primary attack surface.
Are your systems exposed?
Follow TechNadu for more.
#Cybersecurity #ICS #OTSecurity
Malware threats are speeding up across critical infrastructure as legacy systems are exposed. jpmellojr.blogspot.com/2026/04/malw... #Cybersecurity #CriticalInfrastructure #Malware #ICS #Comparitech
CRITICAL: Iran-linked hackers disrupt US infrastructure via PLC & SCADA attacks. OT disruptions ongoing — check vendor advisories & strengthen OT defenses now. radar.offseq.com/threat/iran-linked-hacke... #OffSeq #ICS #OTsecurity
[ Your Digital Girl ]
Nia gets jumps scared by ENA.
#ENA #ENAfanart #ENAjoelg #ICS #icantsleep
CRITICAL: Iran-linked actors disrupt US critical infrastructure via PLC & SCADA attacks ⚠️. No CVE yet. Monitor vendor updates, follow federal guidance, and secure OT environments. radar.offseq.com/threat/iran-linked-hacke... #OffSeq #ICS #CyberThreat
~Cisa~
Iranian APTs are exploiting internet-facing PLCs in US critical infrastructure to cause operational disruptions.
-
IOCs: 135. 136. 1. 133, 185. 82. 73. 162, 185. 82. 73. 164
-
#APT #ICS #ThreatIntel
🌼 Warm wishes for a Happy Easter!
@bri-forth.bsky.social @imsforth.bsky.social @imbb-forth.bsky.social
#ICS #IESL #ICEHT #IACM #IA #IG #GIHG
#Easter2026 #EasterWishes #Easterholidays
OH wrong room my bad girl
Holy crap if that liquid is real...
it looks like you visited your roomate in the worst moment possible #ican'tsleep #icantsleep #nosleep666 #ICS #nsfw #fanart
My local library has a nice calendar page with event filters for age group, location, etc. But no #RSS or #ICS feed, just non-standard #HTML formatted search results. So I'm currently wrangling #Codex into writing a middle-man service that uses ReaderLM-v2 to standardize the results into json […]
This is what happens when cyber risk turns into downtime.
In our latest blog, we break down the Jaguar Land Rover production shutdown and how cyber incidents can cascade into real-world operational disruption.
Read: enaxy.com/2026/04/when...
#OTSecurity #ICS #Cybersecurity #Manufacturing #Enaxy
AI is being used to power cyberattacks, and it’s becoming a target itself. Attackers have wasted no time finding ways to turn AI against the systems running it.
See how AI is being used on both sides of the threat landscape in this eBook 👉 ow.ly/pKit50YAYGt
#AI #cybersecurity #OT #IoT #ICS
Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life March 2026 marks passwordless tipping point: Microsoft forces passkey migratio...
#Identity #& #Access #IoT #& #ICS #Security […]
[Original post on securityboulevard.com]
Verpassen Sie keine Ausgabe und bleiben Sie auf dem neuesten Stand, um die digitale Sicherheit zu stärken!
👉 Jetzt anmelden: www.gai-netconsult.de/security-jou...
#SecurityJournal #CyberSecurity #Informationssicherheit #Sicherheitsmanagement #ICS #OTSecurity #RiskManagement #StaySecure
How One Utility Secured 650,000 Power Connections With estimated cybercrime costs reaching $10.5 trillion between 2020 and 2025, the energy sector has become a primary target internationally. Recor...
#Cybersecurity #Energy #ICS #Security #Content #Disarm […]
[Original post on iiot-world.com]
The Hidden Tracking Risk Inside Your Tires In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because...
#Data #Security #IoT #& #ICS #Security […]
[Audio] [Original post on securityboulevard.com]
More interesting discussion in the HN comments:
“Why Are Executives Enamored With AI But ICs Aren’t?”, John Wang (johnjwang.com/post/2026/03...).
Via HN: news.ycombinator.com/item?id=4754...
#AI #LLMs #SoftwareEngineering #Executives #Management #Business #ICs #Leaders #Quality
📊 THREAT REPORT: Ransomware attacks with physical impact fell 25% in 2025, but nation-state attacks on critical infrastructure DOUBLED. The slowdown is likely temporary. 🏭 #ThreatIntel #ICS #CriticalInfrastructure
#OutNow in #iCS
How should multimodal disinformation be analysed? This article proposes the Three-M framework, arguing that multimodality, manipulation, and malintent must be examined together.
doi.org/10.1080/1369...
#OutNow in #iCS
From voluntary guidelines to mandatory rules, this article compares emerging election-time AI codes across 11 countries and assesses their enforceability and clarity.
doi.org/10.1080/1369...
#OutNow in #iCS
This article examines the business model of disinformation through the case of InfoWars. By linking broadcast features to next-day sales, it shows how media style and commercial incentives reinforce one another.
doi.org/10.1080/1369...
#OutNow in #iCS
As generative AI systems increasingly express social values, conflicts shift from technical competition to cultural contestation. This article theorises values shaping and values signalling in AI design and governance.
doi.org/10.1080/1369...
#OutNow in #iCS
In this article, Jensen explores how artists understand and evaluate music-streaming payment systems, showing why reform debates often clash with everyday career realities and with opaque payout structures.
doi.org/10.1080/1369...
#OutNow in #iCS
Using Michel Serres’ parasite logic and a netnographic study of a large Facebook caremongering community, this article uncovers interferences that both threaten and sustain solidarity in digital mutual aid.
doi.org/10.1080/1369...
#ICS #OT crowd: I'm looking for "Production Line Design for Dummies"-type resources. I'm primarily interested in high-level best practices, rules of thumb for making industrial processes work reliably, ELI5 level is sufficient. Let's say I want to build a lemonade factory for my
1/2
Think antivirus and firewalls are enough? That assumption can leave critical gaps especially in OT/ICS.
In our latest OT Myths post we explore why perimeter defenses fall short and what a layered approach really looks like.
Read 👉 enaxy.com/2026/03/myth...
#OTSecurity #ICS #Cybersecurity #Enaxy
Poland saw 270,000 cyberattacks in 2025 - up 2.5x.
Energy infrastructure hit with destructive malware, not ransomware.
Is this the new normal for cyber warfare?
#Cybersecurity #ThreatIntel #ICS
Only 18 days of Early Bird left! #SOA26
💡ICS members: Early Bird is additional to the reduced member rate, the best price on your tickets.
✨Non-members also save significantly by booking before the deadline!
Secure your place: ow.ly/gsBW50YyuGk
#IntensiveCare #CriticalCare #ICU #ICS #Congress