2.2.2 Dragonfly 2.0 Malware The Dragonfly organization, also known as Energetic Bear, mainly carries out cyber espionage activities targeting electric power operators, major power generation enterprises, petroleum pipeline operators, and industrial equipment providers in the energy sector. According to a Joint Analysis Report (JAR) released by the Department of Homeland...
Year: 2020
IP Reputation Report-01192020
Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 19, 2020. (more…)
ICS Information Security Assurance Framework 6
2.2 ICS-Targeting Malware Analysis In recent years, more and more malware took ICSs as targets, causing an increasingly great damage. The following sections analyze major ICS-targeting malware. (more…)
Cisco Data Center Network Manager (DCNM) authentication bypass vulnerability Security Alert
Overview Multiple vulnerabilities in the authentication mechanism of Cisco Data Center Network Manager (dcnm) (cve-2019-15975, cve-2019-15976, cve-2019-15977) may allow unauthorized remote attackers to bypass authentication and perform arbitrary operations with administrative privileges on the affected devices. (more…)
ICS Information Security Assurance Framework 5
Typical ICS Security Incidents As ICSs are increasingly informatized and open, more and more attacks are hitting ICSs, doing an increasing harm. ICS-targeted attacks use the IT network as a springboard to affect the operating of OT systems. Currently, attacks against ICSs are carried out to achieve three purposes: disrupting...
ICS Information Security Assurance Framework 4
Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth and depth, ICSs are facing an increasing number of security risks. ICSs' original security protection systems which feature border separation and protection tend to be associated and integrated...


