Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Anatomy Of A 'Cyber-Physical' Attack
Newest First  |  Oldest First  |  Threaded View
Kaytana22
Kaytana22,
User Rank: Apprentice
1/29/2015 | 1:03:58 PM
Hmmm
     It is only a matter of time really, the 'hacktivists' responsible are only going to get better at this. Sooner or later there is going to be a breach and things are going to get very messy. I was just talking to my husband about what would happen if they actually got into the system where they can cause a total shutdown or even an explosion of some kind. It always seems that no matter how good our system securities are, there is always someone out there that is better. I just hope we have the people to combat this threat and keep up on it, to keep people out of the places that we don't want them to be in.

-M. Cummings
SgS125
SgS125,
User Rank: Ninja
1/15/2015 | 3:45:33 PM
Wrench in the works
Reminds me of engineers talking about how they had to add bullet proof steel to electrical transformers because hill billys kept shooting holes in them with high power rifles.  Where there is a will.......

 

Or when striking workers at the meat packing plant simply cut the conveyor belts and left the plant.

 

Always a risk no matter where the "attack" comes from.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
1/15/2015 | 12:10:39 PM
Re: Interesting
The physical barrier is significant. But it does make social engineering a much more serious risk..
Whoopty
Whoopty,
User Rank: Ninja
1/15/2015 | 10:45:52 AM
Interesting
It's very interesting to see that some of the stuff that science-fiction warned us about hackers, is potentially possible as hardware becomes smarter and more connected than ever before.

However, here's hoping that the world catches up to taking security seriously enough that only the most determined - and therefore potentially the most likely culprits - will be able to achieve some of the physical barrier crossings that you described. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-41828
PUBLISHED: 2022-09-29
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.
CVE-2022-3364
PUBLISHED: 2022-09-29
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3.
CVE-2022-39232
PUBLISHED: 2022-09-29
Discourse is an open source discussion platform. Starting with version 2.9.0.beta5 and prior to version 2.9.0.beta10, an incomplete quote can generate a JavaScript error which will crash the current page in the browser in some cases. Version 2.9.0.beta10 added a fix and tests to ensure incomplete qu...
CVE-2022-40472
PUBLISHED: 2022-09-29
ZKTeco Xiamen Information Technology ZKBio Time 8.0.7 Build: 20220721.14829 was discovered to contain a CSV injection vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload injected into the Content text field of the Add New Message module.
CVE-2022-36068
PUBLISHED: 2022-09-29
Discourse is an open source discussion platform. In versions prior to 2.8.9 on the `stable` branch and prior to 2.9.0.beta10 on the `beta` and `tests-passed` branches, a moderator can create new and edit existing themes by using the API when they should not be able to do so. The problem is patched i...