Several New Critical Flaws Affect CODESYS Industrial Automation Software – Tempemail

Cybersecurity researchers on Wednesday disclosed multiple security vulnerabilities impacting CODESYS automation software and the WAGO programmable logic controller (PLC) platform that could be remotely exploited to take control of a company’s cloud operational technology (OT) infrastructure. The flaws can be turned “into innovative attacks that could put threat actors in Continue Reading

10 Critical Flaws Found in CODESYS Industrial Automation Software – Tempemail

Cybersecurity researchers on Thursday disclosed as many as ten critical vulnerabilities impacting CODESYS automation software that could be exploited to remote code execution on programmable logic controllers (PLCs). “To exploit the vulnerabilities, an attacker does not need a username or password; having network access to the industrial controller is enough,” Continue Reading

LIVE Webinar — The Rabbit Hole of Automation – Tempemail

The concept of automation has taken on a life of its own in recent years. The idea is nothing new, but the current interest in automation is a mix of both hype and innovation. On the one hand, it’s much easier today to automate everything from small processes to massive-scale Continue Reading

Threat landscape for industrial automation systems. Statistics for H2 2020- Tempemail

Figures Indicator H1 2020 H2 2020 2020 Global percentage of attacked ICS computers 32.6% 33.42% 38.55% Percentage of attacked ICS computers by region Northern Europe 10.1% 11.5% 12.3% Western Europe 15.1% 14.8% 17.6% Australia 16.3% 17.0% 18.9% United States and Canada 17.2% 16.5% 19.6% Eastern Europe 26.4% 28.0% 30.5% Southern Continue Reading

Download the Essential Guide to Response Automation – Tempemail

In the classic children’s movie ‘The Princess Bride,’ one of the characters utters the phrase, “You keep using that word. I do not think it means what you think it means.” It’s freely used as a response to someone’s misuse or misunderstanding of a word or phrase. “Response Automation” is Continue Reading

Mobile Automation with Robot Framework and Appium- Tempemail

I am here with some good news: mobile automation with Robot Framework and Appium will make your team’s life easier. As technology and software become more and more complex, quality assurance departments face greater challenges every day. We are forced to validate our products faster, better and safer. So, what Continue Reading

Researchers Warn of Critical Flaws Affecting Industrial Automation Systems – Tempemail

A critical vulnerability uncovered in Real-Time Automation’s (RTA) 499ES EtherNet/IP (ENIP) stack could open up the industrial control systems to remote attacks by adversaries. RTA’s ENIP stack is one of the widely used industrial automation devices and is billed as the “standard for factory floor I/O applications in North America.” Continue Reading

Red Team — Automation or Simulation? – Tempemail

What is the difference between a penetration test and a red team exercise? The common understanding is that a red team exercise is a pen-test on steroids, but what does that mean? While both programs are performed by ethical hackers, whether they are in-house residents or contracted externally, the difference Continue Reading

Threat landscape for industrial automation systems. H1 2020 highlights- Tempemail

Overall downward trend for percentages of attacked computers globally Beginning in H2 2019 we have observed a tendency for decreases in the percentages of attacked computers, both in the ICS and in the corporate and personal environments. In H1 2020 the percentage of ICS computers on which malicious objects were Continue Reading

Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine – Tempemail

We have all heard of the “cybersecurity skills gap” — firms’ inability to hire and retain high-level cybersecurity talent. I see this gap manifesting in two ways. First, companies that want to hire cybersecurity talent simply cannot find candidates with sufficient skills. Second, companies that cannot afford specialized cybersecurity talent Continue Reading