Friday Squid Blogging: Online Cephalopod Course

Read Time:14 Second

Atlas Obscura has a five-part online course on cephalopods, taught by squid biologist Dr. Sarah McAnulty.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read my blog posting guidelines here.

Read More

golang-1.19.9-1.el7

Read Time:12 Second

FEDORA-EPEL-2023-efd9bbf67e

Packages in this update:

golang-1.19.9-1.el7

Update description:

Security fix for CVE-2023-24538, CVE-2023-24536 , CVE-2023-24537, CVE-2023-24534, CVE-2023-24539, CVE-2023-29400, and CVE-2023-24540

Read More

Researchers find new ICS malware toolkit designed to cause electric power outages

Read Time:53 Second

Over the past few years state-sponsored attackers have been ramping up their capabilities of hitting critical infrastructure like power grids to cause serious disruptions. A new addition to this arsenal is a malware toolkit that seems to have been developed for red-teaming exercises by a Russian cybersecurity company.

Dubbed COSMICENERGY by researchers from Mandiant, the malware can interact with remote terminal units (RTUs) and other operational technology (OT) devices that communicate over the specialized IEC 60870-5-104 (IEC-104) protocol and are commonly used for electrical engineering and power automation.

“COSMICENERGY is the latest example of specialized OT malware capable of causing cyber physical impacts, which are rarely discovered or disclosed,” the Mandian researchers said in their report. “Analysis into the malware and its functionality reveals that its capabilities are comparable to those employed in previous incidents and malware, such as INDUSTROYER and INDUSTROYER.V2, which were both malware variants deployed in the past to impact electricity transmission and distribution via IEC-104.”

To read this article in full, please click here

Read More