Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italian
  • English
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
SecurityIT | Cyber Security Consulting
 
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts
×
  • Home
  • Company
    • About Us
    • Culture and values
    • Il team
    • ISO certified company
    • Mission
  • Training
    • List of courses
  • Cyber security
    • Penetration test
    • ADVICE ISO / IEC 27001
    • Consulenza informatica in ambito privacy
    • Vulnerability assessment consulting
    • Payment card industry data security standard
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Services of Threat Intelligence e Cyber Intelligence
    • Forensic analysis and investigation
    • Social media Security
  • Integration Systems IT
    • Solutions
  • News
  • Contacts

Category: ICS

  1. Home
  2. ICS

High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian

high-severity-vulnerabilities-found-in-wellintech-industrial-data-historian

Cisco Talos researchers found two high-severity vulnerabilities in WellinTech’s KingHistorian industrial data historian software.

The post High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian appeared first on SecurityWeek.

Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA

ransomware-will-likely-target-ot-systems-in-eu-transport-sector:-enisa

Ransomware and data related attacks are the top cybersecurity threats to the transport sector in the EU, ENISA says.

The post Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA appeared first on SecurityWeek.

Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products

organizations-notified-of-remotely-exploitable-vulnerabilities-in-aveva-hmi,-scada-products

Industrial organizations using HMI and SCADA products from Aveva have been informed about potentially serious vulnerabilities.

The post Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products appeared first on SecurityWeek.

Waterfall Security, TXOne Networks Launch New OT Security Appliances

waterfall-security,-txone-networks-launch-new-ot-security-appliances

Waterfall Security Solutions and TXOne Networks have each announced launching new OT security appliances.

The post Waterfall Security, TXOne Networks Launch New OT Security Appliances appeared first on SecurityWeek.

ICS Patch Tuesday: Siemens, Schneider Electric Address Over 100 Vulnerabilities

ics-patch-tuesday:-siemens,-schneider-electric-address-over-100-vulnerabilities

Siemens and Schneider Electric have addressed more than 100 vulnerabilities with their March 2023 Patch Tuesday security advisories.

The post ICS Patch Tuesday: Siemens, Schneider Electric Address Over 100 Vulnerabilities appeared first on SecurityWeek.

Counting ICS Vulnerabilities: Examining Variations in Numbers Reported by Security Firms

counting-ics-vulnerabilities:-examining-variations-in-numbers-reported-by-security-firms

Reports published by various industrial cybersecurity companies provide different numbers on ICS vulnerabilities — here’s why.

The post Counting ICS Vulnerabilities: Examining Variations in Numbers Reported by Security Firms appeared first on SecurityWeek.

Exploitation of Bitrix CMS Vulnerability Drives ICS Attack Surge in Russia

exploitation-of-bitrix-cms-vulnerability-drives-ics-attack-surge-in-russia

Kaspersky has seen a surge in attacks on ICS computers in Russia and blames it on the exploitation of a Bitrix CMS vulnerability tracked as CVE-2022-27228.

The post Exploitation of Bitrix CMS Vulnerability Drives ICS Attack Surge in Russia appeared first on SecurityWeek.

Critical Vulnerabilities Allow Hackers to Take Full Control of Wago PLCs

critical-vulnerabilities-allow-hackers-to-take-full-control-of-wago-plcs

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

The post Critical Vulnerabilities Allow Hackers to Take Full Control of Wago PLCs appeared first on SecurityWeek.

Critical Vulnerabilities Patched in ThingWorx, Kepware IIoT Products

critical-vulnerabilities-patched-in-thingworx,-kepware-iiot-products

Several ThingWorx and Kepware products are affected by two vulnerabilities that can be exploited for DoS attacks and unauthenticated remote code execution.

The post Critical Vulnerabilities Patched in ThingWorx, Kepware IIoT Products appeared first on SecurityWeek.

US Electric Cooperative Association Launches Commercial OT Security Solution

us-electric-cooperative-association-launches-commercial-ot-security-solution

The National Rural Electric Cooperative Association (NRECA) announces commercial launch of its OT cybersecurity solution.

The post US Electric Cooperative Association Launches Commercial OT Security Solution appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Cyber Security Consulting
Linkedin-in Envelope Map-marker-alt

The group

  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission
×
  • Company
  • ISO certified company
  • About Us
  • Team
  • Culture and values
  • Mission

Services

  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
×
  • Computer consulting services
  • Social media Security
  • Forensic analysis and investigation
  • Services of Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Vulnerability assessment consulting
  • Consulenza informatica in ambito privacy
  • ADVICE ISO / IEC 27001
  • Penetration test
© show.it | All Rights Reserved | VAT 06984320017 | Privacy Policy | Cookie Policy | Made by incio.it