News
Industrial perimeter defenses strained by segmentation gaps, legacy ICS systems, vendor access risks
2+ hour, 19+ min ago (816+ words) Third-party connectivity adds further pressure to ICS'perimeter defenses. In 2025, 42% of manufacturing companies reported a breach related to vendor access, and 46% said that the weakest link in their security was remote access channels. Despite these concerns, many firms have yet to…...
MITRE Caldera releases HVACSim to train OT security defenders without physical hardware
2+ day, 1+ hour ago (402+ words) By mapping protocol-level actions to visible changes in simulated process behavior, the tool bridges a critical gap in practical OT cybersecurity education at a time when threats to building automation and industrial control environments are rising." "Recognizing the growing intersection…...
Cyolo PRO v7.0 introduces AI session intelligence, OT asset discovery to boost industrial access security
2+ day, 1+ hour ago (498+ words) Cyolo PRO v7.0 introduces AI session intelligence, OT asset discovery to boost industrial access security'Industrial Cyber Cyolo PRO v7.0 introduces AI session intelligence, OT asset discovery to boost industrial access security Cyolo, provider of remote privileged access for operational technology (OT) and…...
Tanium achieves CMMC Level 2 certification, strengthening cybersecurity for Department of War partners
4+ day, 3+ hour ago (210+ words) Tanium announced that it has achieved Cybersecurity Maturity Model Certification (CMMC) Level 2. This milestone assures the Department of War (DoW), defense contractors, subcontractors and research institutions that the Tanium Autonomous IT Platform can protect Controlled Unclassified Information (CUI) and operate confidently…...
Net One Partners brings Xage Security’s zero trust platform to manufacturing and critical infrastructure
5+ day, 21+ hour ago (563+ words) Net One Partners brings Xage Security's zero trust platform to manufacturing and critical infrastructure'Industrial Cyber Net One Partners brings Xage Security's zero trust platform to manufacturing and critical infrastructure Net One Partners Co. has signed a distributor agreement with the…...
IBM X-Force reports 44% surge in exploitation of public-facing applications as supply chain and identity attacks intensify
5+ day, 22+ hour ago (955+ words) IBM X-Force reports 44% surge in exploitation of public-facing applications as supply chain and identity attacks intensify'Industrial Cyber IBM X-Force reports 44% surge in exploitation of public-facing applications as supply chain and identity attacks intensify The IBM X-Force Threat Intelligence Index 2026 paints…...
ED 26-03 orders federal agencies to secure Cisco Catalyst SD-WAN systems amid active cyber exploitation
1+ week, 2+ day ago (497+ words) The agency assessed that the situation poses an unacceptable risk to federal civilian networks and requires immediate action. The directive applies to Cisco Catalyst SD-WAN Manager, formerly known as SD-WAN vManage, regardless of configuration, as well as Cisco Catalyst SD-WAN…...
Forescout flags spike in high-severity OT/ICS flaws, exposing visibility gaps that leave critical infrastructure at risk
1+ week, 2+ day ago (382+ words) They added that "One hundred seventy-eight (178) of these advisories were dedicated to medical devices " nearly 5 %. However, there is a growing number of vulnerabilities on critical devices that are not tracked with associated ICSAs, which may leave asset owners and network…...
China-linked UNC2814 exploited Google Sheets API for stealth C2 targeting telecom, government networks
1+ week, 2+ day ago (746+ words) China-linked UNC2814 exploited Google Sheets API for stealth C2 targeting telecom, government networks'Industrial Cyber China-linked UNC2814 exploited Google Sheets API for stealth C2 targeting telecom, government networks Google's Threat Intelligence Group, working with Mandiant and industry partners, has dismantled a sophisticated global cyber espionage…...
VulnCheck finds ransomware operators increasingly relying on zero-days, raising risk in OT environments
1+ week, 2+ day ago (954+ words) VulnCheck finds ransomware operators increasingly relying on zero-days, raising risk in OT environments'Industrial Cyber VulnCheck finds ransomware operators increasingly relying on zero-days, raising risk in OT environments New VulnCheck data disclosed that out of more than 48,000 newly disclosed CVEs in…...