
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Eduard Kovacs, Author at Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/author/editored/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/author/editored/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Tue, 09 Sep 2025 10:42:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>Eduard Kovacs, Author at Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/author/editored/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mitsubishi Electric to Acquire Nozomi Networks</title>
		<link>https://www.icscybersecurityconference.com/mitsubishi-electric-to-acquire-nozomi-networks/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Tue, 09 Sep 2025 10:34:31 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Mitsubishi Electric]]></category>
		<category><![CDATA[Nozomi Networks]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20333</guid>

					<description><![CDATA[<p>Industrial and technology giant Mitsubishi Electric has signed a definitive agreement to acquire OT and IoT cybersecurity company Nozomi Networks in a deal that values the industrial cybersecurity firm at nearly $1 billion. Mitsubishi Electric will acquire the Nozomi Networks shares it does not already own for $883 million in cash. Mitsubishi Electric already owns a 7% stake in Nozomi after participating in Nozomi’s $100 million Series E funding round in 2024. Nozomi has raised more than $250 million in [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/mitsubishi-electric-to-acquire-nozomi-networks/">Mitsubishi Electric to Acquire Nozomi Networks</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Volt Typhoon Hackers Dwelled in US Electric for 300+ Days: Report</title>
		<link>https://www.icscybersecurityconference.com/volt-typhoon-hackers-dwelled-in-us-electric-for-300-days-report/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Fri, 14 Mar 2025 14:39:11 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[grid]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20285</guid>

					<description><![CDATA[<p>Dragos shared some details describing an intrusion attributed to the notorious Chinese threat actor Volt Typhoon into the US electric grid.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/volt-typhoon-hackers-dwelled-in-us-electric-for-300-days-report/">Volt Typhoon Hackers Dwelled in US Electric for 300+ Days: Report</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>ICS Patch Tuesday March 2025: Security Advisories by CISA, Schneider Electric, Siemens </title>
		<link>https://www.icscybersecurityconference.com/ics-patch-tuesday-march-2025-security-advisories-by-cisa-schneider-electric-siemens/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 14:40:08 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Schneider Electric]]></category>
		<category><![CDATA[Siemens]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20286</guid>

					<description><![CDATA[<p>Industrial giants Siemens and Schneider Electric have released March 2025 Patch Tuesday ICS security advisories.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/ics-patch-tuesday-march-2025-security-advisories-by-cisa-schneider-electric-siemens/">ICS Patch Tuesday March 2025: Security Advisories by CISA, Schneider Electric, Siemens </a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>ICS Patch Tuesday September 2024: Advisories Published by ABB, Siemens, Schneider, CISA</title>
		<link>https://www.icscybersecurityconference.com/ics-patch-tuesday-september-2024-advisories-published-by-abb-siemens-schneider-cisa/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 09:53:18 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[ABB]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[Siemens]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20189</guid>

					<description><![CDATA[<p>For September 2024, two dozen ICS Patch Tuesday advisories were published by Siemens, Schneider Electric, CISA and ABB.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/ics-patch-tuesday-september-2024-advisories-published-by-abb-siemens-schneider-cisa/">ICS Patch Tuesday September 2024: Advisories Published by ABB, Siemens, Schneider, CISA</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Iran-Linked &#8220;Cyber Av3ngers&#8221; Hackers Compromise Control System at Pennsylvania Water Utility </title>
		<link>https://www.icscybersecurityconference.com/iran-linked-cyber-av3ngers-hackers-compromise-control-system-at-pennsylvania-water-utility/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 14:12:34 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[water]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20107</guid>

					<description><![CDATA[<p>Iran-Linked "Cyber Av3ngers" hackers compromised an industrial control system at the Municipal Water Authority of Aliquippa (MWAA) in Pennsylvania.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/iran-linked-cyber-av3ngers-hackers-compromise-control-system-at-pennsylvania-water-utility/">Iran-Linked &#8220;Cyber Av3ngers&#8221; Hackers Compromise Control System at Pennsylvania Water Utility </a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>CISA Announces Free Vulnerability Scanning for Water Utilities</title>
		<link>https://www.icscybersecurityconference.com/cisa-announces-free-vulnerability-scanning-for-water-utilities/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Wed, 13 Sep 2023 13:10:07 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Waterfall]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=20043</guid>

					<description><![CDATA[<p>CISA announced a new vulnerability scanning service designed to help water utilities identify and address security holes that could expose their systems to remote attacks.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/cisa-announces-free-vulnerability-scanning-for-water-utilities/">CISA Announces Free Vulnerability Scanning for Water Utilities</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>NSA, CISA Explain How Adversaries Plan and Execute ICS/OT Attacks</title>
		<link>https://www.icscybersecurityconference.com/nsa-cisa-explain-how-adversaries-plan-and-execute-ics-ot-attacks/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Sat, 24 Sep 2022 18:09:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19340</guid>

					<description><![CDATA[<p>A joint advisory describes five typical steps involved in planning and executing an attack on Industrial control systems (ICS) and other operational technology (OT) systems</p>
<p>The post <a href="https://www.icscybersecurityconference.com/nsa-cisa-explain-how-adversaries-plan-and-execute-ics-ot-attacks/">NSA, CISA Explain How Adversaries Plan and Execute ICS/OT Attacks</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>All ICS Vendors Impacted by OT:Icefall Vulnerabilities Have Released Advisories</title>
		<link>https://www.icscybersecurityconference.com/all-ics-vendors-impacted-by-oticefall-vulnerabilities-have-released-advisories/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 17:00:53 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[OT:Icefall]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19322</guid>

					<description><![CDATA[<p>All ICS vendors impacted by the recently-disclosed OT:Icefall vulnerabilities have released advisories to inform customers about the impact of the flaws and to provide mitigations.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/all-ics-vendors-impacted-by-oticefall-vulnerabilities-have-released-advisories/">All ICS Vendors Impacted by OT:Icefall Vulnerabilities Have Released Advisories</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Russia-Linked Pipedream/Incontroller ICS Malware Designed to Target Energy Facilities</title>
		<link>https://www.icscybersecurityconference.com/russia-linked-pipedream-incontroller-ics-malware-designed-to-target-energy-facilities/</link>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 14 Apr 2022 14:17:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=19299</guid>

					<description><![CDATA[<p>A modular ICS attack framework and a collection of custom-made tools, can be used by threat actors to target ICS and SCADA devices, including programmable logic controllers (PLCs) from Schneider Electric and Omron, and OPC UA servers.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/russia-linked-pipedream-incontroller-ics-malware-designed-to-target-energy-facilities/">Russia-Linked Pipedream/Incontroller ICS Malware Designed to Target Energy Facilities</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Intelligence Gathering on U.S. Critical Infrastructure</title>
		<link>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/</link>
					<comments>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 10 Oct 2019 15:04:35 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[shodan]]></category>
		<guid isPermaLink="false">https://www.icscybersecurityconference.com/?p=3027</guid>

					<description><![CDATA[<p>How Open Source Intelligence can be applied to reconnaissance on critical infrastructure. In many cases it’s possible to narrow a search to specific buildings like power plants, wastewater plants, or chemical and manufactured facilities. The research consists of 26,000 exposed devices in United States.</p>
<p>The post <a href="https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/">Intelligence Gathering on U.S. Critical Infrastructure</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/intelligence-gathering-on-u-s-critical-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
