Operational tech devices exposed to known vulnerabilities


Analysis of close to one million operational technology (OT) devices by Claroty's Team82 research group finds that 12 percent contain known exploited vulnerabilities (KEVs), and 40 percent of the organizations analyzed have a subset of these assets insecurely connected to the internet.
The report uncovered over 111,000 KEVs in OT devices across manufacturing, logistics and transportation, and natural resources organizations, with 68 percent of these being linked to ransomware groups. The manufacturing industry was found to have the highest number of devices with confirmed KEVs (over 96,000).
Remote access tools leave OT systems at risk of attack


Remote access tools are creating cybersecurity risks and operational burdens for operational technology (OT) systems, according to a new report.
The study, from the Claroty Team82 threat research team, using data from more than 50,000 remote-access-enabled devices shows that the volume of remote access tools deployed is excessive, with 55 percent of organizations having four or more and 33 percent having six or more.
Cyberattacks on critical infrastructure increase 30 percent


Between January 2023 and January this year, critical infrastructure worldwide saw over 420 million attacks -- equivalent to 13 attacks per second -- marking a 30 percent increase from 2022.
A new report from security awareness specialist KnowBe4 shows cyberattacks targeting critical infrastructure have surged globally, posing significant risks to national security and economic stability.
Thousands of industrial control devices exposed online


Recent attacks have highlighted the vulnerability of industrial control systems to attack and a new report has found 18,000 exposed devices that are likely used to control industrial systems.
The report, from internet intelligence platform Censys, focuses on ICS devices in the US and UK and also finds that almost 50 percent of the human-machine interfaces associated with water and wastewater systems (WWS) identified could be manipulated without any authentication required.
Increase in third-party access puts OT environments at risk


A new report from Cyolo and the Ponemon Institute reveals that third-party access to operational technology environments is significantly expanding the attack surface.
According to the study, 73 percent permit third-party access to OT environments, with an average of 77 third parties per organization granted such access.
Business and tech leaders collaborate to exploit the edge


Business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions.
A new report from AT&T Cybersecurity finds that collaboration among leaders, as well as external partners in the ecosystem, will be critical for the edge journey ahead. But while the report finds organization's silos are beginning to erode and converge, more progress needs to be made.
Convergence of OT and IT systems sees moves to improve security

Connected device vendors devote more effort to security and safety


More and more connected systems are being used to deliver the essentials of our everyday lives. From the water and power that comes into our homes to the medical treatment we receive, the 'Extended Internet of Things' (XIoT) is involved.
A new report on the state of XIoT security from Claroty's Team82 researchers shows vulnerabilities in these cyber-physical systems disclosed in the second half of 2022 declined by 14 percent since hitting a peak in 2021. At the same time vulnerabilities found by internal research and product security teams have increased by 80 percent over the same period, indicating that vendors are taking the risk seriously.
Vulnerabilities in industrial control systems are on the increase


The number of CVEs reported via ICS advisories has increased each year, with 2020-2021 seeing a 67.3 percent increase in CISA ICS CVEs, while 2021-2022 saw a two percent increase, according to a new report from SynSaber.
The growing volume of vulnerabilities highlights continued efforts to secure the ICS systems critical to a nation's energy, manufacturing, water, and transportation infrastructure. There's also a growing focus on regulation which means operators in critical infrastructure are under more pressure to analyze, mitigate, and report on new and existing vulnerabilities
New cloud-based platform helps protect operational security


As more and more devices that we might not conventionally think of as 'IT' become connected, the risks to enterprises increase.
To address this concern Claroty is launching xDome, a new cloud-based industrial cybersecurity platform that drives cyber and operational resilience for modern industrial businesses.
Industrial systems under threat from wipers and IoT botnets


The latest OT/IoT security report from Nozomi Networks shows that wiper malware and IoT botnets dominate threats to industrial control systems.
Researchers have observed the robust usage of wiper malware, and seen the emergence of an Industroyer variant, dubbed Industroyer2, developed to misuse the IEC-104 protocol, which is commonly used in industrial environments.
Majority of industrial IoT security projects end in failure


According to new research, 93 percent of organizations have had failed industrial Internet of Things or operational technology (IIoT/OT) security projects.
The study from Barracuda Networks surveyed 800 seniors staff responsible for IIoT/OT security and finds that 94 percent admit experiencing a security incident in the last 12 months, while 87 percent of organizations that experienced an incident were impacted for more than one day.
OT and ICS vulnerabilities increase in the second half of 2021


Operational technology and industrial control systems saw a 110 percent increase in the number of vulnerabilities disclosed in the second half of last year.
The latest Biannual ICS Risk & Vulnerability Report from Claroty shows that remotely exploitable vulnerabilities are still causing problems, demonstrating the importance of securing remote connections.
6 IoT trends for 2022


The Internet of Things (IoT) has seen incredible growth in a relatively short period. Despite being fairly new, smart devices are everywhere in commercial and consumer circles, and they show no signs of stopping.
While the IoT’s growth may remain unchanged in 2022, it will shift and evolve. Here are six trends that will shape the IoT this year.
The challenges of protecting industrial control systems [Q&A]


Industrial control systems are often critical to things like power and water supplies. In theory they should have the strongest protection available.
In practice, however, this isn't always the case. It's estimated that 91 percent of industrial companies are vulnerable to cyberattacks. So what can businesses do to protect themselves and to recover quickly if they do get attacked?
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.