
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerabilities Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/tag/vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/tag/vulnerabilities/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Mon, 05 Nov 2018 13:52:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>Vulnerabilities Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/tag/vulnerabilities/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Side-Channel Attacks Put Critical Infrastructure at Risk</title>
		<link>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/</link>
					<comments>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 05 Nov 2018 13:52:26 +0000</pubDate>
				<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[CPU]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[electric]]></category>
		<category><![CDATA[grid]]></category>
		<category><![CDATA[hardware]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[power]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[Side-Channel]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1730</guid>

					<description><![CDATA[<p>ICS Devices Vulnerable to Side-Channel Attacks: Researcher Shows (Eduard Kovacs &#8211; SecurityWeek)  Side-channel attacks can pose a serious threat to industrial control systems (ICS), a researcher warned last month at SecurityWeek’s ICS Cyber Security Conference in Atlanta, GA. Demos Andreou, a lead engineer at power management company Eaton, has conducted an analysis of protection devices typically used in the energy sector, specifically in power distribution stations. Side-channel attacks can be used to extract data from a system based on information [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/">Side-Channel Attacks Put Critical Infrastructure at Risk</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/side-channel-attacks-put-critical-infrastructure-at-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Siemens Warns Customers of New Meltdown, Spectre Variants</title>
		<link>https://www.icscybersecurityconference.com/siemens-warns-customers-of-new-meltdown-spectre-variants/</link>
					<comments>https://www.icscybersecurityconference.com/siemens-warns-customers-of-new-meltdown-spectre-variants/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Wed, 18 Jul 2018 01:20:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[Siemens]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1632</guid>

					<description><![CDATA[<p>(Eduard Kovacs &#8211; SecurityWeek) &#8211; Siemens recently updated its security bulletin for the Meltdown and Spectre vulnerabilities to inform customers of the latest variants, specifically the ones known as LazyFP and Spectre 1.1. Several industrial control systems (ICS) vendors published security advisories for the CPU flaws shortly after they were disclosed in early January. Siemens published a bulletin on speculative side-channel vulnerabilities on January 11. In late May, the company updated its bulletin to include information about Variant 3a and [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/siemens-warns-customers-of-new-meltdown-spectre-variants/">Siemens Warns Customers of New Meltdown, Spectre Variants</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/siemens-warns-customers-of-new-meltdown-spectre-variants/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Vulnerabilities Expose Siemens Central Plant Clocks to Attacks</title>
		<link>https://www.icscybersecurityconference.com/vulnerabilities-expose-siemens-central-plant-clocks-to-attacks/</link>
					<comments>https://www.icscybersecurityconference.com/vulnerabilities-expose-siemens-central-plant-clocks-to-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Tue, 03 Jul 2018 14:30:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[SICLOCK]]></category>
		<category><![CDATA[Siemens]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1622</guid>

					<description><![CDATA[<p>(SecurityWeek &#8211; Eduard Kovacs) Siemens informed customers on Tuesday that some of its SICLOCK central plant clocks are affected by several vulnerabilities, including ones that have been rated “critical.” Siemens SICLOCK devices are used to synchronize time in industrial plants. The central plant clock ensures stability in case of a failure or loss of reception at the primary time source. According to the German industrial giant, SICLOCK systems are affected by a total of six vulnerabilities. The security holes have [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/vulnerabilities-expose-siemens-central-plant-clocks-to-attacks/">Vulnerabilities Expose Siemens Central Plant Clocks to Attacks</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/vulnerabilities-expose-siemens-central-plant-clocks-to-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Siemens Fixes Vulnerabilities in SIMATIC, License Manager Products</title>
		<link>https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/</link>
					<comments>https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 17 Oct 2016 12:57:47 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[SCADA]]></category>
		<category><![CDATA[SIMATIC]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1380</guid>

					<description><![CDATA[<p>(SecurityWeek) &#8211; Siemens has released software updates to address several vulnerabilities in its SIMATIC and Automation License Manager (ALM) products. According to advisories published last week by both ICS-CERT and Siemens, the ALM, which allows customers to centrally manage licenses for their Siemens products, is affected by three vulnerabilities. The security holes, including one rated high severity and one rated critical, were reported to the vendor by researchers from Kaspersky Lab’s critical infrastructure team. The critical vulnerability, tracked as CVE-2016-8565, [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/">Siemens Fixes Vulnerabilities in SIMATIC, License Manager Products</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/siemens-patches-flaws-simatic-license-manager-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
