Your one-stop web resource providing safety and security information to manufacturers

Faux Job Posting Finds Victims

All those people looking for a new position should beware: A targeted malware campaign disguised as a job posting is attempting to compromise specific organizations, researchers found. The infection vector associated with this campaign was a Microsoft Word document that was disguised as a job posting for Cisco Korea, and leveraged legitimate content available as […]

Good Grades for Security Master’s Program

Security careers are in huge demand and with a lack of people to fill all the openings, one university is receiving high grades in its offerings. Tulane University’s Homeland Security online master’s program received high marks from OnlineMasters.com, including the third-best online master’s program and the top program for intelligence officers for 2019. RELATED STORIES […]

IDenticard Updating PremiSys Holes

IDenticard released a software update to mitigate multiple vulnerabilities in its PremiSys access control systems, according to NCCIC. The vulnerabilities are a use of hard-coded credentials, use of hard-coded password, and an inadequate encryption strength. RELATED STORIES Schneider Fixes EVLink Parking Holes Yokogawa has Fix for License Manager Service AVEVA Fixes Wonderware System Platform Hole […]

Schneider Fixes EVLink Parking Holes

Schneider Electric has a recommendation and an update to handle use of hard-coded credentials, code injection, and SQL injection vulnerabilities in its EVLink Parking, according to a report with NCCIC. Successful exploitation of these remotely exploitable vulnerabilities could allow an attacker to stop the device and prevent charging, execute arbitrary commands, and access the web […]

Indegy, IBM Team for IT/OT Visibility

Operational technology (OT) network monitoring provider, Indegy, will integrate its Industrial Cybersecurity Suite with IBM’s QRadar Security Intelligence Platform, in a move to connect visibility between enterprise information technology (IT) environments and industrial, OT environments. Attacks in the OT space have shown today’s Industrial Control Systems (ICS), many of which are now connected to enterprise […]

Pin It on Pinterest