logo
episode-header-image
Jun 2022
42m 9s

Welcome to Control Loop: Giving back to ...

N2K Networks
About this episode

Every two weeks, get the latest in OT news in Control Loop News Brief, an interview featuring a thought leader in the OT space sharing current industry trends, and the Control Loop Learning Lab’s educational segment. A companion monthly newsletter is available through free subscription and on the CyberWire's website.

Headlines include: Russia’s hybrid war against Ukraine. Russian threat actors against industrial control systems. Exploits for Bluetooth Low Energy. Hacktivists claim attacks against Russian ground surveillance robots. New wiper loader. Turla threat actor reconnaissance in Estonian and Austrian networks. Robert M. Lee, CEO of Dragos, talks giving back to the OT community and shares insights on Pipedream malware. Learning Lab has Dragos' Mark Urban and Jackson Evans-Davies talking about the fundamentals of OT cybersecurity.


Control Loop News Brief.

Continuing expectations of escalation in cyberspace.

Microsoft President: Cyber Space Has Become the New Domain of Warfare - Infosecurity Magazine

Cyber Attacks on Ukraine: Not What You Think | PCMag 

Warning: threat actor targets industrial systems.

US warns energy firms of a rapidly advancing hacking threat - E&E News

PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos

Pipedream Malware: Feds Uncover 'Swiss Army Knife' for Industrial System Hacking | WIRED

Indestroyer2 and Ukraine's power grid. 

Twitter: @ESETresearch

Industroyer2: Industroyer reloaded | WeLiveSecurity

Russian hackers tried to bring down Ukraine's power grid to help the invasion | MIT Technology Review

Bluetooth vulnerabilities demonstrated in proof-of-concept.

NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk

Tesla Hacker Proves a Way of Unlocking Doors, Starting Engine - Bloomberg

CISA and its international partners urge following best practices to prevent threat actors from gaining initial access.

Weak Security Controls and Practices Routinely Exploited for Initial Access | CISA

Hacktivists claim to have compromised Russian-manufactured ground surveillance robots.

Did hackers commandeer surveillance robots at a Russian airport?

Twitter: @caucasnet

Politically motivated DDoS attack on Port of London Authority website.

Twitter: @LondonPortAuth

Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack 

New loader identified in wiper campaigns.

Sandworm uses a new version of ArguePatch to attack targets in Ukraine | WeLiveSecurity 

Turla reconnaissance detected in Austrian and Estonian networks.

Russian hackers perform reconnaissance against Austria, Estonia 

TURLA's new phishing-based reconnaissance campaign in Eastern Europe 

SANS ICS Summit is coming to Florida, June 1-9.

ICS Security Summit & Training 2022

Colonial Pipeline’s ransomware attack, one year later.

How the Colonial Pipeline attack instilled urgency in cybersecurity

OT vulnerabilities as credit risk.

Operational Technology Cyberattacks Are a Credit Risk for Utilities

A Cyber Resilience Pledge. 

Global CEOs Commit to Collective Action on Cyber Resilience 

Recent threat intelligence findings from Dragos.

Dragos ICS/OT Ransomware Analysis: Q1 2022


Control Loop Interview.

Robert M. Lee, CEO of Dragos, on giving back to the OT cybersecurity community, the idea behind the Control Loop podcast and newsletter, and his candid thoughts on the Pipedream malware and its creators.

Follow Rob on LinkedIn and Twitter.


Control Loop Learning Lab.

Dragos’ Mark Urban and Jackson Evans-Davies on the fundamentals of OT cybersecurity and network architecture.

Dragos 2021 ICS Cybersecurity Year in Review

How to Build a Roadmap for ICS/OT Cybersecurity: 3 Steps to a Sustainable Program

Managing External Connections to Your Operational Technology Environment

Improving ICS/OT Security Perimeters with Network Segmentation

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Jun 2024
Digging into regulatory compliance issues.
UK will propose law to ban ransom payments for critical infrastructure entities. EPA outlines enforcement measures to protect water utilities against cyberattacks. Rockwell advises customers to disconnect ICS devices from the internet. Senator Vance asks CISA for information on V ... Show More
18m 23s
May 2024
Hacktivism targeting OT devices.
US Defense Department warns of Russian hacktivists targeting OT devices. The US government establishes safety and security board to advise the deployment of AI in critical infrastructure sectors. Vulnerabilities affect CyberPower UPS management software. US congressmen put forwar ... Show More
24m 36s
May 2024
Critical infrastructure: Pending legislation and risks and rewards from AI.
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to af ... Show More
24m 20s
Recommended Episodes
Aug 2024
Almost letting hackers rule the web.
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart car ... Show More
32m 7s
Aug 2023
Attacks on industrial systems in Europe and Africa. LolekHosted arrests. Notes from the hybrid war. The CSRB will investigate the cyberespionage campaign that exploited Microsoft Exchange.
An African power generator has been targeted by ransomware. The APT31 group is believed to be responsible for attacks on industrial systems in Eastern Europe. There have been arrests related to the takedown of LolekHosted. Ukraine's SBU has alleged that Russia's GRU is using spec ... Show More
27m 15s
Aug 2024
Cybersecurity leaders gear up for the ultimate test.
Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols ... Show More
33m 2s
Feb 2023
Vulnerabilities newly exploited in the wild. A new cyberespionage campaign. Trends in the C2C marketplace. Hacktivists, other auxiliaries, and the laws of armed conflict.
CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data ce ... Show More
28m 45s
Jun 24
Iran’s digital threat after U.S. strikes.
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government dev ... Show More
31m 35s
Feb 2025
FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
Cybersecurity Today: North Korean Hacks, AI Memory Breach, and School Data Comprimise In this episode of Cybersecurity Today, host Jim Love covers a range of crucial topics in the cybersecurity landscape. North Korean hackers are using new social engineering tactics to infiltrate ... Show More
9m 51s
Sep 2024
UK’s newest cybersecurity MVPs.
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from ... Show More
34m 29s
Nov 2024
Cyber Espionage and Financial Crime: North Korea’s Double Threat
In this episode of Threat Vector, host David Moulton speaks with Assaf Dehan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dehan, a cybersecurity expert with over 18 years of experience, discusses the nation's str ... Show More
33m 28s
Dec 2024
Buckets of trouble.
Researchers uncover a large-scale hacking operation tied to the infamous ShinyHunters. A Dell Power Manager vulnerability lets attackers execute malicious code. TikTok requests a federal court injunction to delay a U.S. ban. Radiant Capital attributed a $50 million cryptocurrency ... Show More
37m 20s
May 28
Fingers point east.
The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender webs ... Show More
34m 47s