News
OT-ISAC flags rising energy sector cyber risk as OT exposure spreads beyond control rooms into distributed assets
2+ hour, 21+ min ago (612+ words) The OT-ISAC notes that APAC relevance does not hinge on confirmed destructive incidents in the region during this period. It stems from something harder to dismiss: shared vendor ecosystems, comparable distributed architectures, rapid renewable expansion, and adversary tradecraft that is…...
NCSC launches Silent Glass device to block hardware-based cyber threats, secure vulnerable display links
1+ day, 2+ hour ago (297+ words) The plug-in device is intended to provide scalable, low-cost protection for government and business users. It is being introduced to the global market at CYBERUK, the UK government's flagship cybersecurity conference, as part of a broader push to strengthen defenses…...
CISA urges immediate patching of Cisco ASA and Firepower devices due to active zero-day exploits
5+ mon, 2+ week ago (19+ words) The US CISA urges urgent patching of Cisco ASA and Firepower devices amid continuing exploitation of zero-day vulnerabilities....
CISA, NCSC warn Firestarter malware enabling persistent backdoor access to exposed Cisco firewall infrastructure
1+ day, 2+ hour ago (383+ words) It added that the malware outlined is relevant for Cisco Firepower and Secure Firewall devices; however, CISA has only observed a successful implant of the malware in the wild on a Cisco Firepower device running ASA software. The report pointed…...
Cato traces large-scale Modbus/TCP activity targeting PLCs, exposing persistent gaps in OT security
4+ day, 6+ hour ago (263+ words) A second pattern revealed a clear fingerprint-then-target approach. Attackers first queried devices for identifying details such as vendor, product, and version, then followed up with a fixed register read at address 0x B414, consistently pulling eight registers. This suggests scripted fingerprinting followed…...
Cybersecurity agencies flags use of covert networks by China-linked actors for espionage, offensive operations
4+ day, 6+ hour ago (643+ words) These networks are used for each phase of the Cyber Kill Chain, from reconnaissance and malware delivery, to command and control and data exfiltration against targets of espionage and offensive cyber operations," the advisory warns. The threat is a dynamic,…...
ENISA updates NCAF 2. 0 to help governments measure and close cybersecurity gaps, push cyber maturity benchmarking
5+ day, 2+ hour ago (594+ words) At the European level, NCAF 2. 0 serves as a common reference point to encourage mutual learning and the sharing of best practices among member states. The framework has been updated to reflect the evolving EU cybersecurity policy landscape, including alignment with…...
UK NCSC details cross domain model to secure data flows across trust boundaries, prescribes six design principles
5+ day, 2+ hour ago (306+ words) Rather than focusing on fixed boundaries or specific technologies, the new approach looks at the end'to'end architecture needed to make these functions secure and reliable. A central part of this approach is developing an explicit understanding of what data flows…...
Ransomware reaches elevated "new normal" as attack volumes hold steady into 2026, reshape baseline risk expectations
1+ week, 5+ day ago (1040+ words) Industrial Cyber News Editor. Anna Ribeiro is a freelance journalist with over 14 years of experience in the areas of security, data storage, virtualization and Io T. Ransomware reaches elevated "new normal" as attack volumes hold steady into 2026, reshape baseline risk expectations…...
NCSC flags widening gap between cyber threats and national resilience, urges action as AI fuels rise in disruptive attacks
5+ day, 20+ hour ago (236+ words) Ellison notes that given the escalating intent and capability of cyber threat actors, organizations must treat the prospect of severe cyber threats as a credible and pressing risk." He added, "Preparing for this is a leadership responsibility. Effective preparation not…...