Main Points:
Picture this: You’re a parent trying to feed a fussy toddler. You figure out the perfect spoon-fed mash that doesn’t revolt them, only to discover a new food they refuse next week. Keeping up with industrial control system (ICS) vulnerabilities feels nearly the same, except with potentially global consequences. According to fresh numbers from SynSaber, a sharp increase in unpatchable vulnerabilities has been observed in the first half of 2023. A noteworthy 34% of these vulnerabilities lacked a patch or remediation strategy, a troubling leap from the previous year’s 13%. It seems like cybersecurity experts had their plate full and then some!
When it comes to ICS vulnerabilities, it seems like we’re churning them out faster than your grandma’s knitting needles. For an illustration, consider this: A whopping 670 distinct product flaws were reported to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in just the first half of 2023. Compared to the speed at which we generate cat videos on the internet, you’d think we’d have secured our infrastructure by now!
In the first half of 2023, a significant increase in the number of unpatchable vulnerabilities affecting industrial control systems was seen, with 34% of them lacking any corrective measures. This represents an increase from just 13% in the previous year, which is quite worrying. Adding to this, an overwhelming number of 670 product flaws were reported to CISA, clearly highlighting the scale of the threat. So, I guess we had better get back to the cybersecurity drawing board, and fast…because this issue is growing faster than a dad’s appreciation for bad puns at a BBQ!
Original Article: https://thehackernews.com/2023/08/industrial-control-systems.html
No products in the cart.