Industrial Cybersecurity Pulse
Providing critical information and solutions to cybersecurity professionals
Industrial Cybersecurity Vulnerabilities and Updates
Industrial Cybersecurity Vulnerabilities and Updates
Throwback Attack: The Marconi wireless hack of 1903
Throwback Attack: The Marconi wireless hack of 1903
Throwback Attack: Ken Thompson lays the foundation for software supply chain attacks
Throwback Attack: Ken Thompson lays the foundation for software supply chain attacks
Vulnerability Update: Every week, we catalog the major industrial cybersecurity vulnerabilities and updates you should know about. Here are the notable threats from the week of January 2 - 8
Vulnerability Update: Every week, we catalog the major industrial cybersecurity vulnerabilities and updates you should know about. Here are the notable threats from the week of January 2 - 8
Throwback Attack: iEncrypt ransomware shuts down sales and operations at AriZona Beverages
Throwback Attack: iEncrypt ransomware shuts down sales and operations at AriZona Beverages
Throwback Attack: Egregor ransomware attacks Metro Vancouver TransLink
Throwback Attack: Egregor ransomware attacks Metro Vancouver TransLink
As more and more people head back into the office, public transportation is becoming normalized again. However, a customer has to keep track of route schedules, tickets and everything else they need to lug with them. The last thing on someone’s mind when they’re waiting for their ride at a TransLink (or any other form […]
White Paper: Traditional vs. zero-trust architecture, which is right for your organization and why?
White Paper: Traditional vs. zero-trust architecture, which is right for your organization and why?
Cybersecurity Vulnerabilities Update: November 21 – November 27, 2021
Cybersecurity Vulnerabilities Update: November 21 – November 27, 2021
Cybersecurity Vulnerabilities Update: November 14 – November 20, 2021
Cybersecurity Vulnerabilities Update: November 14 – November 20, 2021
Throwback Attack: Three teens stoke fears of a cyber war with the Solar Sunrise attack GARY COHENNOVEMBER 18, 2021
Throwback Attack: Three teens stoke fears of a cyber war with the Solar Sunrise attack GARY COHENNOVEMBER 18, 2021
In the throes of a military action, everything is heightened. In February 1998, the U.S. and President Bill Clinton were preparing to bomb Iraq, as the country’s then-President Sadaam Hussein refused to comply with United Nations Security Council inspectors who were searching for weapons of mass destruction. Just as tensions in the Gulf were coming […]
Cybersecurity Vulnerabilities Update: November 7 – November 13, 2021
Cybersecurity Vulnerabilities Update: November 7 – November 13, 2021
Throwback Attack: BlackEnergy attacks the Ukrainian power grid
Throwback Attack: BlackEnergy attacks the Ukrainian power grid
Cybersecurity Vulnerabilities Update: November 1 – November 7, 2021
Cybersecurity Vulnerabilities Update: November 1 – November 7, 2021
Throwback Attack: An insider releases 265,000 gallons of sewage on the Maroochy Shire
Throwback Attack: An insider releases 265,000 gallons of sewage on the Maroochy Shire
Cybersecurity Awareness Month roundtable video 3: Culture, buy-in and future challenges
Cybersecurity Awareness Month roundtable video 3: Culture, buy-in and future challenges
Cybersecurity Awareness Month roundtable video 2: critical national infrastructure, IT/OT and the future of cyber
Cybersecurity Awareness Month roundtable video 2: critical national infrastructure, IT/OT and the future of cyber
Cybersecurity Vulnerabilities Update: October 18 – October 24, 2021
Cybersecurity Vulnerabilities Update: October 18 – October 24, 2021
Cybersecurity Awareness Month roundtable video 1: regulations, supply chain and SBOMs
Cybersecurity Awareness Month roundtable video 1: regulations, supply chain and SBOMs
Getting Cybersecurity Buy-in: Expert Interview Series, Matt Leipnik, Nexus Controls
Getting Cybersecurity Buy-in: Expert Interview Series, Matt Leipnik, Nexus Controls
Defending Against Ransomware: Expert Interview Series, Ron Brash, Verve Industrial Protection
Defending Against Ransomware: Expert Interview Series, Ron Brash, Verve Industrial Protection
Bridging the Cybersecurity Gap: 5 Things IT and OT Can Learn From Each Other
Bridging the Cybersecurity Gap: 5 Things IT and OT Can Learn From Each Other
Throwback: Petya, the red skull of ransomware
Throwback: Petya, the red skull of ransomware
Cybersecurity Vulnerabilities Update: September 27-October 3, 2021
Cybersecurity Vulnerabilities Update: September 27-October 3, 2021
Defending Against Ransomware: Expert Interview Series, Ron Brash, Verve Industrial Protection
Defending Against Ransomware: Expert Interview Series, Ron Brash, Verve Industrial Protection
Throwback Attack: How NotPetya accidentally took down global shipping giant Maersk
Throwback Attack: How NotPetya accidentally took down global shipping giant Maersk
Ron Brash Interview: Expert advice on the CVSS and OT Systems
Ron Brash Interview: Expert advice on the CVSS and OT Systems
Cybersecurity Vulnerabilities Update: September 20-26, 2021
Cybersecurity Vulnerabilities Update: September 20-26, 2021
Throwback Attack: How a cyber war against Estonia turned the country into a global leader
Throwback Attack: How a cyber war against Estonia turned the country into a global leader
A Case for SBOMs: Expert Interview Series, Eric Byres, aDolus Technology
A Case for SBOMs: Expert Interview Series, Eric Byres, aDolus Technology
Cybersecurity Vulnerabilities Update: September 13-19, 2021
Cybersecurity Vulnerabilities Update: September 13-19, 2021
Leveraging AI to protect OT: Expert interview series, Hayley Turner, Darktrace
Leveraging AI to protect OT: Expert interview series, Hayley Turner, Darktrace
Throwback Attack: ILOVEYOU, a love letter no one wanted
Throwback Attack: ILOVEYOU, a love letter no one wanted
Get on the beat with Industrial Cybersecurity Pulse
Get on the beat with Industrial Cybersecurity Pulse
Ransomware Attacks and OT: Expert Interview Series, Hayley Turner, Darktrace
Ransomware Attacks and OT: Expert Interview Series, Hayley Turner, Darktrace
Cybersecurity Vulnerabilities Update: September 6-12, 2021
Cybersecurity Vulnerabilities Update: September 6-12, 2021
Throwback Attack: The Morris Worm launches the first major attack on the internet
Throwback Attack: The Morris Worm launches the first major attack on the internet
Throwback Attack: Teamsters refuse to pay after Labor Day cyberattack
Throwback Attack: Teamsters refuse to pay after Labor Day cyberattack
Fearlessly Implement Cybersecurity at the Edge
Fearlessly Implement Cybersecurity at the Edge
Getting to Know the CMMC: Expert Interview Series, Ryan Heidorn, Steel Root
Getting to Know the CMMC: Expert Interview Series, Ryan Heidorn, Steel Root
Cybersecurity Vulnerabilities Update: August 23-29, 2021
Cybersecurity Vulnerabilities Update: August 23-29, 2021
Stopping Supply Chain Attacks: Expert Interview Series, Eric Byres, aDolus Technology
Stopping Supply Chain Attacks: Expert Interview Series, Eric Byres, aDolus Technology
Throwback Attack: Ransomware criminals hack SFMTA rail system (and then get hacked themselves)
Throwback Attack: Ransomware criminals hack SFMTA rail system (and then get hacked themselves)
Cybersecurity Management: CEO Interview Series, Pranav Patel, ResiliAnt
Cybersecurity Management: CEO Interview Series, Pranav Patel, ResiliAnt
Edge Computing and Cybersecurity: Expert Interview Series, Rick Peters, Fortinet
Edge Computing and Cybersecurity: Expert Interview Series, Rick Peters, Fortinet
Throwback Attack: SamSam hobbles the city of Atlanta with an extensive ransomware attack
Throwback Attack: SamSam hobbles the city of Atlanta with an extensive ransomware attack
Get on the beat with Industrial Cybersecurity Pulse
Get on the beat with Industrial Cybersecurity Pulse
Cybersecurity Vulnerabilities Update: August 9-15, 2021
Cybersecurity Vulnerabilities Update: August 9-15, 2021
The Next Industrial Control Systems: Expert Interview Series, Albert Rooyakkers, Bedrock Automation
The Next Industrial Control Systems: Expert Interview Series, Albert Rooyakkers, Bedrock Automation
Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
Industrial CyberSecurity Pulse YouTube Channel
Industrial CyberSecurity Pulse YouTube Channel
Why OT Should Own Their Cybersecurity: Expert Interview Series, Dino Busalachi, Velta Technology
Why OT Should Own Their Cybersecurity: Expert Interview Series, Dino Busalachi, Velta Technology
Throwback Attack: Visser Precision suffers a DoppelPaymer ransomware attack
Throwback Attack: Visser Precision suffers a DoppelPaymer ransomware attack
Take a cost-productive approach to OT cybersecurity
Take a cost-productive approach to OT cybersecurity
The CVSS and OT Systems: Expert Interview Series, Ron Brash, Verve Industrial Protection
The CVSS and OT Systems: Expert Interview Series, Ron Brash, Verve Industrial Protection
The Role of AI in Cybersecurity: Expert Interview Series, David Masson, Darktrace
The Role of AI in Cybersecurity: Expert Interview Series, David Masson, Darktrace
Throwback Attack: How a single whaling email cost $61 million
Throwback Attack: How a single whaling email cost $61 million
Introduction to Cybersecurity within Cyber-Physical Systems
Introduction to Cybersecurity within Cyber-Physical Systems
Defending Against Ransomware: Expert Interview Series, Ron Brash, Verve Industrial Protection
Defending Against Ransomware: Expert Interview Series, Ron Brash, Verve Industrial Protection
Throwback Attack: A ransomware attack shuts down the Parkview Medical Center IT networks at the worst time
Throwback Attack: A ransomware attack shuts down the Parkview Medical Center IT networks at the worst time
How ransomware hackers are trying to bribe employees
How ransomware hackers are trying to bribe employees
Throwback Attack: Ragnar Locker uses social media to extort the Campari Group
Throwback Attack: Ragnar Locker uses social media to extort the Campari Group
Cybersecurity and Visibility: Expert Interview Series, Dino Busalachi, Velta Technology
Cybersecurity and Visibility: Expert Interview Series, Dino Busalachi, Velta Technology
The Fragility of OT Networks: Expert Interview Series, David Masson, Darktrace
The Fragility of OT Networks: Expert Interview Series, David Masson, Darktrace
Throwback Attack: Chinese hackers steal plans for the F-35 fighter in a supply chain heist
Throwback Attack: Chinese hackers steal plans for the F-35 fighter in a supply chain heist
Cybersecurity Educational Course
Cybersecurity Educational Course
Cyberattacks surge by 33% in a year
Cyberattacks surge by 33% in a year
Throwback Attack: The AIDS trojan unleashes ransomware on the world in 1989
Throwback Attack: The AIDS trojan unleashes ransomware on the world in 1989
Proactive management of plant cybersecurity
Proactive management of plant cybersecurity
Throwback Attack: A cyberattack causes physical damage at German steel mill
Throwback Attack: A cyberattack causes physical damage at German steel mill
Cybersecurity required for safe IIOT robots
Cybersecurity required for safe IIOT robots
Sustainable cybersecurity architecture for safety instrumented systems
Sustainable cybersecurity architecture for safety instrumented systems
Industrial control system (ICS) cybersecurity advice, best practices
Industrial control system (ICS) cybersecurity advice, best practices
Research: Cybersecurity requires asset updates
Research: Cybersecurity requires asset updates
The IT/OT Divide: Expert Interview Series, Bryan Bennett, ESD
The IT/OT Divide: Expert Interview Series, Bryan Bennett, ESD
Work From Home Revolution: Expert Interview Series, Tyler Whitaker, Leading2Lean
Work From Home Revolution: Expert Interview Series, Tyler Whitaker, Leading2Lean
Government Response to Cybersecurity: Expert Interview Series, Tyler Whitaker, Leading2Lean
Government Response to Cybersecurity: Expert Interview Series, Tyler Whitaker, Leading2Lean
Rise in Ransomware Attacks: Expert Interview Series, Wayne Dorris, Axis Communications
Rise in Ransomware Attacks: Expert Interview Series, Wayne Dorris, Axis Communications
Bridging the Gap Between IT and OT: Expert Interview Series, Wayne Dorris, Axis Communications
Bridging the Gap Between IT and OT: Expert Interview Series, Wayne Dorris, Axis Communications
Getting to Know the CMMC: Expert Interview Series, Ryan Heidorn, Steel Root
Getting to Know the CMMC: Expert Interview Series, Ryan Heidorn, Steel Root
Edge Computing and Cybersecurity: Expert Interview Series, Rick Peters, Fortinet
Edge Computing and Cybersecurity: Expert Interview Series, Rick Peters, Fortinet
Setting a National Cybersecurity Standard: Expert Interview Series, Jim Crowley, Industrial Defender
Setting a National Cybersecurity Standard: Expert Interview Series, Jim Crowley, Industrial Defender
Facebook
Facebook
Instagram
Instagram
LinkedIn
LinkedIn
X
X
View on mobile
Explore other Linktrees
Alyson Stoner
@alysonstoner
Sofia Tilbury
@sofiatilbury
OrelSanTour2026
@OrelSanTour2026
Lindsey Arnold
@Lindsarnold
Gabby Windey
@gabbywindey
Ken Eurich
@keneurich
Verstappen Com
@verstappencom
Halley Kate
@halleykmcg
Ellen Pompeo
@ellenpompeo
Jenn Leuke
@jenneatsgoood
previous
next
Discover more
See all
@efetivaterapia
@warwickautism
@desaiyash669
@zainali5121436
@f0rev3ry0ng
@stjohnau
@papodesantidade
@comicsetc
@jezierski.racing
@iSCOD
@MrGangni
@pizzanapraia_beachclubmourao
@trendmyshaadi
@g4z4na
@still5shy
@substationbrixton
@net.rockhampton
@sportsaifootball
@mathiasgenkel
@magg0tbrain
@michaelsalercrpc
@muhamadiqbalpermana1996
@smartlearner.com
@spa520
@belanegarun
@loversbridalco
@Enivremoi
@nvitaputri
@jamessteve621
@transition_ofc
@yasminjarbas
@ninayogapilates
@taylorrenihan
@nc_solucoes
@osolete1309
@postoftpoa
@carmencashh
@jamieforseattle
@j0nt
@VeezDigitalRE
@b.sellz
@draevelinejaudy
@khalidalmaashani
@Thriftdayone
@BadBonnieBi