OT security stories
Ransomware hit manufacturers hardest in 2025 as incidents climbed 56 per cent, with ageing factory systems and suppliers widening exposure.
Poor asset data can leave critical systems exposed, as the update turns xDome visibility gaps into prioritised security tasks.
Customers can now spot hidden operational technology and IoT devices without extra hardware, helping close risky blind spots across mixed networks.
Customers can now spot hidden factory-floor and building systems in Tenable's platform without extra hardware, agents or software.
Most companies still lack confidence in their response as 73% of senior cyber security decision-makers say they are not ready for a major attack.
The update gives security teams prioritised fixes for missing asset data as attacks on operational technology continue to expose gaps in defences.
Growing fears over harvest-now, decrypt-later attacks are driving demand for quantum-safe controls as data moves to edge systems and cloud services.
Enterprises can now assess suspicious files in under 100 milliseconds, as OPSWAT adds a machine-learning layer to MetaDefender.
Buyers of industrial control systems may gain confidence as Yokogawa’s plant software clears three independent cybersecurity certifications.
Proxy networks built from compromised home devices are helping attackers hide in plain sight across Asia Pacific, Lumen says.
Credential theft and trusted tools are helping intruders bypass traditional defences, with manufacturing firms among the hardest hit.
Modern regulators now sit below software defences, raising the risk of attacks that could disrupt services, corrupt data or damage hardware.
Quantum fears are driving demand for hardware encryption at hard-to-secure remote sites, as Sitehop targets infrastructure, banks and government.
Australian security teams are under pressure to prioritise fixes as attacks surge and exploited vulnerabilities can now be used within five days.
Security teams are turning to continuous, risk-based assessment as fragmented tools leave them unable to see which exposures matter most.
Critical infrastructure and cloud operators face harder-to-detect attacks as criminals turn routers, VPN gateways and IoT kit into proxies.
Critical infrastructure operators could face remote building systems attacks after Claroty found flaws in a standard linking legacy controls to IP networks.
Road agencies face rising threats as a Detroit expo adds a new Cybersecurity & Data Zone for connected transport systems.
Operational technology outages are leaving most manufacturers and critical infrastructure firms facing losses of up to GBP £5 million, a survey found.
The deal gives the cyber security consultancy more than 175 specialists and deeper access to regulated clients across south-west England.