Skip to content

Cyber Security Blog

Open Menu

SCADA Security

24/07/2023

SCADA Security Hacking Story: New York Dam

SCADA Security

In 2013, an incident occurred in New York involving the intrusion of Iranian hackers into a small dam known as Bowman Dam. While the nature…

Sohini
13/07/2023

SCADA Security Hacking Story: Target Stores

SCADA Security

SCADA system attacks typically occur through an organization’s business network, impacting the remote control systems. However, in 2013, hackers took a different approach by targeting…

Sohini
12/07/2023

SCADA Security Hacking Story: Stuxnet

SCADA Security

In 2010, Stuxnet emerged as one of the most intricate malware ever discovered. It infiltrated control system networks, leading to speculations that it severely impacted…

Sohini
05/07/2023

SCADA Security Hacking Story: Shamoon – Saudi Aramco and RasGas

SCADA Security

In 2012, Saudi Aramco, the prominent global energy company, encountered a severe and unprecedented cyber incident that sent shockwaves through the industry. The company fell…

Sohini
04/07/2023

SCADA Security Hacking Story: Duqu, Flame, and Gauss

SCADA Security

In 2011, Hungarian cyber security researchers made a significant discovery of three information-stealing malware: Duqu, Flame, and Gauss. This malware was found to be related…

Sohini
03/01/2020

Fundamentals Of SCADA Security – 4

SCADA Security

Security threats to SCADA and RTU The SCADA systems which tie up together the decentralized facilities like; oil and gas pipelines, waste water collection, power…

Soumya
03/01/2020

Fundamentals Of SCADA Security – 3

SCADA Security

Introduction to RTU The remote terminal unit abbreviated as RTU is an electronic device that is controlled through the use of a microprocessor. It helps…

Soumya
03/01/2020

Fundamentals Of SCADA Security – 2

SCADA Security

Introduction to PLC Programmable logic controllers abbreviated as PLC are said to be industrial computers that help monitor inputs, make relevant decisions on the basis…

Soumya
03/01/2020

Fundamentals Of SCADA Security – 1

SCADA Security

Introduction to SCADA Supervisory Control and Data Acquisition abbreviated as SCADA is regarded as a complete system constituting of hardware and software components that helps…

Soumya

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3