Comments
Project 'Gridstrike' Finds Substations To Hit For A US Power Grid Blackout
Newest First  |  Oldest First  |  Threaded View
Brian.365
50%
50%
Brian.365,
User Rank: Apprentice
1/11/2016 | 7:32:23 PM
Probably much more vulnerability out there....
Years back, I did an interesting study on a theoretical terrorist attack to San Onofre Generating Station in Southern California, before new units of the nuclear power plant came on line. I got all the info I needed from the public library and the Environmental Impact Report. Although it is now in the process of decommissioning, back in 1980's it appeared to be very vulnerable to sabotage and terrorism.  The ocean intake cooling tubes were wide open and could easily be compromised. Without adequate cooling water the plant would have been toast. My only credentials to do such a study is that I was a commercial diver a few years prior.
Leati
50%
50%
Leati,
User Rank: Apprentice
1/11/2016 | 4:35:48 PM
Re: Correction?
No, it's okay
sbarry71
50%
50%
sbarry71,
User Rank: Apprentice
1/7/2016 | 4:08:43 PM
Correction?
"He will speak publicly for the first time about the Gridstrike research next week at the S4x2016 ICS/SCADA conference in Miami."

 

Pretty sure I attended a webinar about the report January 13th of 2015.


RIP, 'IT Security'
Kevin Kurzawa, Senior Information Security Auditor,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17906
PUBLISHED: 2018-11-19
Philips iSite and IntelliSpace PACS, iSite PACS, all versions, and IntelliSpace PACS, all versions. Default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.
CVE-2018-9209
PUBLISHED: 2018-11-19
Unauthenticated arbitrary file upload vulnerability in FineUploader php-traditional-server <= v1.2.2
CVE-2018-9207
PUBLISHED: 2018-11-19
Arbitrary file upload in jQuery Upload File <= 4.0.2
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...