med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

339
active users

#unitronics

0 posts0 participants0 posts today
Censys<p>Our own <span class="h-card" translate="no"><a href="https://infosec.exchange/@mle" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mle</span></a></span> sat down with @ITBrew to discuss Censys' latest research into internet-accessible devices from automation manufacturer <a href="https://infosec.exchange/tags/Unitronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unitronics</span></a> -- and what this means for critical infrastructure communities. Check it out: <a href="https://www.itbrew.com/stories/2024/02/22/water-damage-censys-finds-149-internet-exposed-unitronics-devices" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">itbrew.com/stories/2024/02/22/</span><span class="invisible">water-damage-censys-finds-149-internet-exposed-unitronics-devices</span></a></p><p><a href="https://infosec.exchange/tags/censysresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>censysresearch</span></a></p>
Not Simon<p><strong>US Treasury</strong> Press Release: Treasury Sanctions Actors Responsible for Malicious Cyber Activities on Critical Infrastructure. Treasury’s Office of Foreign Assets Control (OFAC) sanctioned six officials in the Iranian Islamic Revolutionary Guard Corps Cyber-Electronic Command (IRGC-CEC), an Iranian government organization responsible for a series of malicious cyber activities against critical infrastructure in the United States and other countries.<br>🔗 <a href="https://home.treasury.gov/news/press-releases/jy2072" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">home.treasury.gov/news/press-r</span><span class="invisible">eleases/jy2072</span></a></p><p><a href="https://infosec.exchange/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a> <a href="https://infosec.exchange/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> <a href="https://infosec.exchange/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberespionage</span></a> <a href="https://infosec.exchange/tags/CyberAv3ngers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAv3ngers</span></a> <a href="https://infosec.exchange/tags/Unitronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unitronics</span></a> <a href="https://infosec.exchange/tags/CVE_2023_6448" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE_2023_6448</span></a> <a href="https://infosec.exchange/tags/IRGC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRGC</span></a> <a href="https://infosec.exchange/tags/IRGC_CEC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRGC_CEC</span></a> <a href="https://infosec.exchange/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/Treasury" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Treasury</span></a> <a href="https://infosec.exchange/tags/pressrelease" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pressrelease</span></a></p>
ICS Advisory Project<p>The ICS Advisory Project will update its dashboards and GitHub repository tonight for the 16 new and 1 updated CISA Industrial Control Systems Advisories released today (12/14) for the following ICS vendors:</p><p>ICSA-23-348-01 Cambium ePMP 5GHz Force 300-25 Radio </p><p>ICSA-23-348-02 Johnson Controls Kantech Gen1 ioSmart</p><p>ICSA-23-348-03 Siemens User Management Component (UMC)</p><p>ICSA-23-348-04 Siemens LOGO! and SIPLUS LOGO!</p><p>ICSA-23-348-05 Siemens SIMATIC and SIPLUS Products</p><p>ICSA-23-348-06 Siemens OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC</p><p>ICSA-23-348-07 Siemens SIMATIC STEP 7 (TIA Portal)</p><p>ICSA-23-348-08 Siemens Web Server of Industrial Products</p><p>ICSA-23-348-09 Siemens Simantic S7-1500 CPU family</p><p>ICSA-23-348-10 Siemens SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1</p><p>ICSA-23-348-11 Siemens SINUMERIK</p><p>ICSA-23-348-12 Siemens SICAM Q100 Devices</p><p>ICSA-23-348-13 Siemens SCALANCE and RUGGEDCOM M-800/S615 Family</p><p>ICSA-23-348-14 Siemens RUGGEDCOM and SCALANCE M-800/S615 Family</p><p>ICSA-23-348-15 Unitronics VisiLogic</p><p>ICSA-23-348-16 Siemens SINEC INS</p><p>ICSMA-20-254-01 Philips Patient Monitoring Devices (Update C)</p><p> </p><p>Read this advisory now from the CISA alert website shown below.</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/12/14/cisa-releases-seventeen-industrial-control-systems-advisories" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/alerts/20</span><span class="invisible">23/12/14/cisa-releases-seventeen-industrial-control-systems-advisories</span></a></p><p>Visit the ICS[AP] interactive dashboards at icsadvisoryproject.com</p><p><a href="https://infosec.exchange/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/icssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icssecurity</span></a> <a href="https://infosec.exchange/tags/otsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otsecurity</span></a><br><a href="https://infosec.exchange/tags/siemens" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>siemens</span></a><br><a href="https://infosec.exchange/tags/philips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>philips</span></a><br><a href="https://infosec.exchange/tags/johnsoncontrols" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>johnsoncontrols</span></a><br><a href="https://infosec.exchange/tags/unitronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unitronics</span></a><br><a href="https://infosec.exchange/tags/cambium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cambium</span></a><br><a href="https://infosec.exchange/tags/manufacturing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>manufacturing</span></a><br><a href="https://infosec.exchange/tags/industrialautomation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>industrialautomation</span></a><br><a href="https://infosec.exchange/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a><br><a href="https://infosec.exchange/tags/publichealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>publichealth</span></a><br><a href="https://infosec.exchange/tags/buildingautomation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>buildingautomation</span></a><br><a href="https://infosec.exchange/tags/Communications" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Communications</span></a><br><a href="https://infosec.exchange/tags/dam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dam</span></a><br><a href="https://infosec.exchange/tags/EmergencyServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmergencyServices</span></a><br><a href="https://infosec.exchange/tags/Energy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Energy</span></a><br><a href="https://infosec.exchange/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a><br><a href="https://infosec.exchange/tags/medicalsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>medicalsecurity</span></a><br><a href="https://infosec.exchange/tags/TransportationSystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TransportationSystems</span></a><br><a href="https://infosec.exchange/tags/Water" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Water</span></a><br><a href="https://infosec.exchange/tags/Wastewatersystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wastewatersystems</span></a><br><a href="https://infosec.exchange/tags/criticalinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>criticalinfrastructure</span></a></p>
Jon Greig<p>CISA said the agency is working to identify water utility operators using devices from Israeli company Unitronics and notifying those organizations if they are at risk of cyberattack</p><p><a href="https://ioc.exchange/tags/water" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>water</span></a> <a href="https://ioc.exchange/tags/Unitronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unitronics</span></a> <a href="https://ioc.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a></p><p><a href="https://therecord.media/cisa-water-utilities-outreach-unitronics-plcs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/cisa-water-uti</span><span class="invisible">lities-outreach-unitronics-plcs</span></a></p>
Avoid the Hack! :donor:<p>Congressmen ask DOJ to investigate water utility hack, warning it could happen anywhere</p><p>Share with your friends: cybersecurity (or the lack of <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a>) has real-world impacts. Here, the drinking water supply to the public wasn't compromised, but the water utility did have to switch to manual operations as a result of the cyber attack.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/unitronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unitronics</span></a> <a href="https://infosec.exchange/tags/plc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>plc</span></a></p><p><a href="https://apnews.com/article/cybersecurity-water-wastewater-israel-hacker-iran-12fc7398a4ed6e6f7a47e83531c50c87" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apnews.com/article/cybersecuri</span><span class="invisible">ty-water-wastewater-israel-hacker-iran-12fc7398a4ed6e6f7a47e83531c50c87</span></a></p>
Not Simon<p><strong>CISA</strong> issued an alert: <em>"Exploitation of Unitronics PLCs used in Water and Wastewater Systems."</em> Cyber threat actors are targeting PLCs associated with WWS facilities, including an identified Unitronics PLC, at a U.S. water facility.<br>🔗 <a href="https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/alerts/20</span><span class="invisible">23/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems</span></a></p><p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/Unitronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unitronics</span></a> <a href="https://infosec.exchange/tags/PLC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PLC</span></a> <a href="https://infosec.exchange/tags/Aliquippa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aliquippa</span></a> <a href="https://infosec.exchange/tags/CyberAv3ngers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAv3ngers</span></a> <a href="https://infosec.exchange/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a> <a href="https://infosec.exchange/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a></p>