techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.2K
active users

#otcybersecurity

0 posts0 participants0 posts today

It's rap time! This year's #S4x25 OT security conf rap riffed on organizer Dale Peterson's keynote re: be an "OT security artist."

References to his talk, Grammy's Song of the Year "Not Like Us" by
Kendrick Lamar w/line "I see dead people" & a Picasso-attributed quote re: wield the rules like a pro, then break them like an artist.

Read the rap straight up in bold & yellow highlight and/or read the reference notes below each line.

I’m not our year in review report, but I’ve definitely noted a fascinating uptick in some specific types of Incident Response in our (all) industrial customers:

1) Structured investigations of already occurred industrial accidents to eliminate or identify computer root cause as part of process.
2) Forensic analyses and clean up of long-term infections and lack of perimeter control of those environments.
3) Follow on investigation of intrusions into IT to eliminate or identify potential overflow to or from OT.

It’s really great to see now’s companies taking these on procedurally and with an understanding of how different IR is in these spaces. #OTcybersecurity #ICSCybersecurity

Originally planned as a 1U OPNsense build from last August...currently using as a Proxmox server for my OT cyber security lab with a full simulated enterprise OT/ICS environment (Virtual OPNsense, Enterprise Active Directory w/simulated users, OpenPLC, Scada-LTS, Factory.io)

-Intel H61 Mini-ITX, i5 3470T
-8x2 GB DDR3
-Noctua NF-A4x20 Fans
-HP NC364T Quad NIC
-2X 128GB SSD
-Rackchoice 1U Case
-DEVMO PCI-E 4X Riser Cable
#opnsense #proxmox #homelab #cybersecurity #OTcybersecurity #icssecurity

Happy New Year! Here are the ICS Advisory Project 2023 Annual Summary Slides for CISA ICS Advisories and this week's Other CERT & Vendor vulnerability advisories weekly summary for 25 – 29 December 2023. Attached are 2023's Annual summary slides.

Link to ICS Advisory Project Annual Summary Slides: drive.google.com/file/d/1HYDE_

This past week, CISA did not release any new ICS Advisories. In its place, the ICS[AP] provided a high-level summary of the 380 CISA ICS Advisories released in 2023. Within this summary, you will find a high-level review of the following:

- Total Number of vendors reported in ICS Advisories ranked by country
- Vendors with a high number of critical severity vulnerabilities
- Overview of Vendor & products Affected Global Distribution & Updated CISA Advisories in 2023
- Overview of 2023 CISA ICS Advisories CVE CVSS Vectors by Severity
- Top 10 CWEs identified on MITRE's 2023 CWE Top 25 Most Dangerous Software Weaknesses (MDSW).
- Most reported impacted Critical Infrastructure sectors and by Vendor
- ICS Asset Type metrics
- Total number of CISA ICS Advisories correlated to CISA KEV Catalog
- Mitigation statics based on CISA ICS Advisories recommendations
- Top Independent Vulnerability Researchers and Research Organizations for 2023

ICS[AP] identified 12 new other CERT and vendor products security advisories were released this week for vulnerabilities in the following Vendor products: Moxa (LTE Wireless Gateway & Ethernet remote I/O with 2-port Ethernet switch), Buffalo (Router), Weintek (HMI), and Gallagher (Access Control System). See Weekly Summary of Other Vendor & CERT Advisories for potentially impacted CI sectors.

View the summary details of other CERT & Vendor product advisories identified last week (25 – 29 December 2023) at: drive.google.com/file/d/1wBofo

No updates were added to the CISA KEV Catalog this week.

Visit the ICS[AP] CISA KEV Catalog Dashboards: icsadvisoryproject.com/ics-adv

View previous ICS Advisory Project annual and weekly summaries: icsadvisoryproject.com/ics-adv

To view the updated ICS Advisory Project Dashboards, visit: icsadvisoryproject.com

We appreciate everyone's comments & support. Have a great week!

#CISA #ot #ics #otcybersecurity #otsecurity #icscybersecurity
#cybersecurity #cybersecuritythreats #cybersecurityawareness

In my last post, I mentioned some cool things to come in 2023... so let's gooo! 🙌

In my research analyst role at SANS, I'm running a survey through March 28 on OT/ICS visibility-- and I want to hear from the community! We're looking for experts to share their perspective on IT and OT visibility, #industrial organizations and their SOCs, as well as detection capabilities across IT and OT networks. We'll share the findings in a public report released later this year so everyone can leverage the insights to help improve their OT visibility program.

Link to survey ➡ sans.org/u/1pqp

If driving our industry's detection capabilities is not enough incentive for you, don't worry, there's more! All respondents will be entered for a chance to win a $250 Amazon gift card for participating!

I'm pleased to announce our new paper has been published! This work discusses a technique, and subsequently presents a proof of concept, for scanning for vulnerabilities within PLC control logic. As I've mentioned through numerous talks and work recently, traditional enterprise focused reconnaissance, enumeration, and vulnerability scanning techniques are inadequate against OT and provide very little information on OT-specific vulnerabilities. This tool goes further than typical network scanning to understand where the control logic itself may have vulnerabilities. Read the paper here:

sciencedirect.com/science/arti

We hope this work is just the first step in tooling to improve the state of in-PLC vulnerabilities and PLC programming practices, greatly reducing the exploitability of OT moving forward.