div class=ts-pagebutton class=gotoPage data-page=1Page 1button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=1 data-page=1 class=ts-thumb lazyload alt=Page 1: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails1jpg width=140 height=200 divdiv class=annotationa href=http:wwwus-certgovcontrol_systemspracticesdocumentsDefense_in_Depth_Oct09pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspracticesdocumentsDefense_in_Depth_Oct09pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfIncident_Handling_Brochure_Nov_2010pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfIncident_Handling_Brochure_Nov_2010pdfadivdivdiv class=ts-pagebutton class=gotoPage data-page=2Page 2button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=2 data-page=2 class=ts-thumb lazyload alt=Page 2: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails2jpg width=140 height=200 divdiv class=annotationa href=http:wwwirongeekcomiphppage=videosderbycon1mccorkle-and-rios-100-bugs-in-100-days-an-analysis-of-ics-scada-software rel=ugc nofollow target=_blankhttp:wwwirongeekcomiphppage=videosderbycon1mccorkle-and-rios-100-bugs-in-100-days-an-analysis-of-ics-scada-softwareadiv div class=annotationa href=http:windowsmicrosoftcomen-uswindowsproductslifecycle rel=ugc nofollow target=_blankhttp:windowsmicrosoftcomen-uswindowsproductslifecycleadiv div class=annotationa href=http:supportmicrosoftcomgplifepolicy rel=ugc nofollow target=_blankhttp:supportmicrosoftcomgplifepolicyadivdivdiv class=ts-pagebutton class=gotoPage data-page=3Page 3button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=3 data-page=3 class=ts-thumb lazyload alt=Page 3: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails3jpg width=140 height=200 diva href=http:blogstechnetcomblifecyclearchive20080317extended-support-for-business-and-developer-productsaspx rel=ugc nofollow target=_blankhttp:blogstechnetcomblifecyclearchive20080317extended-support-for-business-and-developer-productsaspxadivdiv class=ts-pagebutton class=gotoPage data-page=4Page 4button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=4 data-page=4 class=ts-thumb lazyload alt=Page 4: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails4jpg width=140 height=200 divdiv class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-ALERT-12-116-01Apdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-ALERT-12-116-01Apdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-ALERT-12-116-01pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-ALERT-12-116-01pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-ALERT-12-020-03Bpdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-ALERT-12-020-03Bpdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-ALERT-12-019-01Apdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-ALERT-12-019-01Apdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-ALERT-12-097-02pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-ALERT-12-097-02pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-ALERT-12-097-01pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-ALERT-12-097-01pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-030-01Apdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-030-01Apdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-102-01pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-102-01pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-102-02pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-102-02pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-102-03pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-102-03pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-102-04pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-102-04pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-102-05pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-102-05pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-095-01Apdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-095-01Apdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-088-01Apdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-088-01Apdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-095-01pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-095-01pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICSA-12-062-01pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICSA-12-062-01pdfadiv div class=annotationa href=http:wwwus-certgovcontrol_systemspdfICS-CERT_Monthly_Monitor_Apr2012pdf rel=ugc nofollow target=_blankhttp:wwwus-certgovcontrol_systemspdfICS-CERT_Monthly_Monitor_Apr2012pdfadivdivdiv class=ts-pagebutton class=gotoPage data-page=5Page 5button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=5 data-page=5 class=ts-thumb lazyload alt=Page 5: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails5jpg width=140 height=200 divdiv class=annotationa href=http:wwwnewscientistcomarticledn21756-bullet-time-to-stop-cyber-attacks-on-power-gridshtml rel=ugc nofollow target=_blankhttp:wwwnewscientistcomarticledn21756-bullet-time-to-stop-cyber-attacks-on-power-gridshtmladiv div class=annotationa href=http:gcncomarticles20120427cybereye-lack-of-fundamentals-threat-to-securityaspx rel=ugc nofollow target=_blankhttp:gcncomarticles20120427cybereye-lack-of-fundamentals-threat-to-securityaspxadiv div class=annotationa href=http:arstechnicacombusinessnews201204backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systemsars rel=ugc nofollow target=_blankhttp:arstechnicacombusinessnews201204backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systemsarsadiv div class=annotationa href=http:gcncomarticles20120425bit9-cybersecurity-survey-expect-attacks-but-no-regulationsaspx rel=ugc nofollow target=_blankhttp:gcncomarticles20120425bit9-cybersecurity-survey-expect-attacks-but-no-regulationsaspxadiv div class=annotationa href=http:wwwbit9comfilesResearch_Bit9_US_Global_Survey_2012_FINALpdf rel=ugc nofollow target=_blankhttp:wwwbit9comfilesResearch_Bit9_US_Global_Survey_2012_FINALpdfadiv div class=annotationa href=http:grassrootslinuxcomcybersecurity-bills-cannot-fix-our-problems rel=ugc nofollow target=_blankhttp:grassrootslinuxcomcybersecurity-bills-cannot-fix-our-problemsadiv div class=annotationa href=http:gcncomArticles20120424Cybersecurity-hearing-major-attack-inevitableaspx rel=ugc nofollow target=_blankhttp:gcncomArticles20120424Cybersecurity-hearing-major-attack-inevitableaspxadiv div class=annotationa href=http:wwwreuterscomarticle20120423net-us-iran-oil-cyber-idUSBRE83M0P120120423 rel=ugc nofollow target=_blankhttp:wwwreuterscomarticle20120423net-us-iran-oil-cyber-idUSBRE83M0P120120423adiv div class=annotationa href=http:wwwarcwebcomindustry-news2012-04-20control-system-security-center-against-cyber-attacks-established-in-japanaspx rel=ugc nofollow target=_blankhttp:wwwarcwebcomindustry-news2012-04-20control-system-security-center-against-cyber-attacks-established-in-japanaspxadiv div class=annotationa href=http:gcncomarticles20120427cybereye-lack-of-fundamentals-threat-to-securityaspx rel=ugc nofollow target=_blankhttp:gcncomarticles20120427cybereye-lack-of-fundamentals-threat-to-securityaspxadivdivdiv class=ts-pagebutton class=gotoPage data-page=6Page 6button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=6 data-page=6 class=ts-thumb lazyload alt=Page 6: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails6jpg width=140 height=200 divdiv class=annotationa href=http:wwwsecuritynewsdailycom1753-firewall-prevent-pacemaker-hackinghtml rel=ugc nofollow target=_blankhttp:wwwsecuritynewsdailycom1753-firewall-prevent-pacemaker-hackinghtmladiv div class=annotationa href=http:wwwinfosecurity-magazinecomview25245smart-grid-cybersecurity-not-keeping-pace-with-deployment-survey-finds rel=ugc nofollow target=_blankhttp:wwwinfosecurity-magazinecomview25245smart-grid-cybersecurity-not-keeping-pace-with-deployment-survey-findsadiv div class=annotationa href=http:wwwdarkreadingcomadvanced-threats167901091securityattacks-breaches232900475 rel=ugc nofollow target=_blankhttp:wwwdarkreadingcomadvanced-threats167901091securityattacks-breaches232900475adiv div class=annotationa href=http:wwwdarkreadingcomadvanced-threats167901091securityapplication-security232900471 rel=ugc nofollow target=_blankhttp:wwwdarkreadingcomadvanced-threats167901091securityapplication-security232900471adiv div class=annotationa href=https:githubcomHoneProject rel=ugc nofollow target=_blankhttps:githubcomHoneProjectadiv div class=annotationa href=http:newssoftpediacomnewsABB-Refuses-to-Patch-Vulnerabilities-in-Legacy-Systems-263008html rel=ugc nofollow target=_blankhttp:newssoftpediacomnewsABB-Refuses-to-Patch-Vulnerabilities-in-Legacy-Systems-263008htmladiv div class=annotationa href=http:wwwnetworkworldcomnews2012040412-dhs-cyberattack-257946html rel=ugc nofollow target=_blankhttp:wwwnetworkworldcomnews2012040412-dhs-cyberattack-257946htmladiv div class=annotationa href=http:wwwtechworldcomauarticle420612 rel=ugc nofollow target=_blankhttp:wwwtechworldcomauarticle420612adiv div class=annotationa href=http:wwwnextgovcomnextgovng_20120404_8857phporef=topnews rel=ugc nofollow target=_blankhttp:wwwnextgovcomnextgovng_20120404_8857phporef=topnewsadivdivdiv class=ts-pagebutton class=gotoPage data-page=7Page 7button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=7 data-page=7 class=ts-thumb lazyload alt=Page 7: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails7jpg width=140 height=200 divdiv class=annotationa href=https:secureinlgovicsadv0612 rel=ugc nofollow target=_blankhttps:secureinlgovicsadv0612adiv div class=annotationa href=https:secureinlgovicsadv0612 rel=ugc nofollow target=_blankhttps:secureinlgovicsadv0612adiv div class=annotationa href=mailto:abbie@energysecorg rel=ugc nofollow target=_blankmailto:abbie@energysecorgadiv div class=annotationa href=http:cipcompliance-minneapoliseventbritecom rel=ugc nofollow target=_blankhttp:cipcompliance-minneapoliseventbritecomadiv div class=annotationa href=https:secureinlgovicsadv0712 rel=ugc nofollow target=_blankhttps:secureinlgovicsadv0712adiv div class=annotationa href=https:secureinlgovicsadv0712registrationaspx rel=ugc nofollow target=_blankhttps:secureinlgovicsadv0712registrationaspxadiv div class=annotationa href=https:secureinlgovicsadv0912 rel=ugc nofollow target=_blankhttps:secureinlgovicsadv0912adiv div class=annotationa href=https:secureinlgovicsadv0912registrationaspx rel=ugc nofollow target=_blankhttps:secureinlgovicsadv0912registrationaspxadiv div class=annotationa href=mailto:abbie@energysecorg rel=ugc nofollow target=_blankmailto:abbie@energysecorgadiv div class=annotationa href=http:cipcompliance-lasvegaseventbritecom rel=ugc nofollow target=_blankhttp:cipcompliance-lasvegaseventbritecomadivdivdiv class=ts-pagebutton class=gotoPage data-page=8Page 8button div class=ts-imageimg data-url=us-cert-2019-03-27-cert-also-had-to-coordinate-resolution-of-the-vulnerabilitieshtmlpage=8 data-page=8 class=ts-thumb lazyload alt=Page 8: US-CERT · 2019-03-27 · CERT also had to coordinate resolution of the vulnerabilities with multiple ICS vendors ICSA-12-062-01—Invensys Wonderware Information Server Multiple loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader033vdocumentssitereader033viewer20220505155f9f97cb1865a10855629910html5thumbnails8jpg width=140 height=200 divdiv