BUSINESS > Production > Utilities


« Back to News

2021-05-11

Critical Pipeline Network Shut Down By Hackers

UPDATE: A pipeline which supplies 45 percent of the US East coast fuel supply has been shut down by hackers following a ransom attack.

2021-02-19

Hackers Fail To Contaminate Florida Water

Cyber criminals infiltrated a treatment plant using widely used TeamViewer remote software and boosted Sodium Hydroxide to dangerous levels.

2020-12-23

The SolarWinds Hack Can Directly Affect Industrial Control Systems

Sophisticated Russian hackers compromised SolarWinds' Orion platform, taking over control of IT infrastrucure & industrial control systems.

2020-07-28

Critical Infrastructure And Cyber Security

Cyber security is top priority for both power system operators and governments. Now, Siemens is joining with NATO to improve network defences.

2020-07-20

The Growing Cyber Threat To Renewable Energy

Recent cyber attacks on global renewable energy businesses have underlined the scale and nature of this previously under-reported threat.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

2020-06-02

German Critical Infrastructure At Risk Of Russian Hacking

Russian hackers have a special intrusion technique to target the computer  systems used by industrial firms to manage critical infrastructure.

2020-05-13

Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used servers located in the US to deliver an attack on Israel's water and sewage infrastructure.

2020-05-04

Hackers Attack Israel’s Water Infrastructure

Hackers have targeted supervisory control and data acquisition (SCADA) systems at water treatment plants and pumping stations.

2020-03-31

The EU Power Grid Is Under Attack

The organisation responsible for coordinating EU electricity markets has disclosed its IT network has been compromised in a “cyber intrusion.”

2019-10-23

Reduce Business Disruption - Make Cyber Security A Priority

Half of security experts in the manufacturing & utilities sectors surveyed say that their organisations don't invest enough in cyber security.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Spanish Network of Excellence on Cybersecurity Research (RENIC)

Spanish Network of Excellence on Cybersecurity Research (RENIC)

RENIC is a membership based sectoral association that includes research centers and other agents of the research cybersecurity ecosystem in Spain.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.