Notably, this isn’t the first time CISA has had to step in to help plug a critical vulnerability in ThroughTek devices. A vulnerability detected by Nozomi Networks equipped hackers with just about the same snooping capabilities as the current vulnerability, minus the ability to control affected devices remotely.
Recent Posts
Tags
Critical infrastructure (9)
Critical Infrastructure Cybersecurity (36)
Critical Infrastructure Security (9)
cybersecurity (69)
cyber threat analysis (5)
Defense in Depth (7)
Guardian (6)
ICS anomaly detection (23)
ICS Asset Inventory (13)
ICS Cybersecurity (63)
ICS Cybersecurity for Substations and Power Grids (5)
ICS Detection Challenge (7)
ICS intrusion detection (6)
ICS Operational Visibility (5)
ICS security (66)
ICS Threat Detection (5)
IEC 61850 (4)
IEC 62351 (9)
IIoT (6)
IIoT Security (7)
industrial control system (9)
Industrial Cybersecurity (52)
Industrial cybersecurity solutions (15)
industrial security (43)
Industroyer (7)
IoT (5)
IoT cybersecurity (15)
IoT devices (4)
IoT device security (5)
IoT Security (38)
IT/OT convergence (6)
Nozomi Networks (7)
Nozomi Networks Labs (5)
operational technology security (6)
OT Cybersecurity (35)
OT security (52)
Power Grid (5)
Power System Security (4)
ransomware (7)
S4 (5)
SANS ICS Survey (5)
SCADA security (12)
threat intelligence (7)
TRITON (8)
WG15 (6)