Advertisement · 728 × 90
#
Hashtag
#ICs
Advertisement · 728 × 90
Original post on mastodon.jordanwages.com

My local library has a nice calendar page with event filters for age group, location, etc. But no #RSS or #ICS feed, just non-standard #HTML formatted search results. So I'm currently wrangling #Codex into writing a middle-man service that uses ReaderLM-v2 to standardize the results into json […]

0 0 0 1
Nia with big fat tits

Nia with big fat tits

Booba.

#ican'tsleep #icantsleep #ICS #nosleep666

10 2 1 0
Post image

This is what happens when cyber risk turns into downtime.

In our latest blog, we break down the Jaguar Land Rover production shutdown and how cyber incidents can cascade into real-world operational disruption.

Read: enaxy.com/2026/04/when...

#OTSecurity #ICS #Cybersecurity #Manufacturing #Enaxy

0 0 0 0
Preview
Winning the AI-Powered Cyberwar How to Evaluate AI-driven Security Solutions for OT/ICS and IoT Environments This eBook looks at how AI is being used to power cyberattacks, including attacks on AI systems and models, and how defenders are harnessing it to protect their environments.

AI is being used to power cyberattacks, and it’s becoming a target itself. Attackers have wasted no time finding ways to turn AI against the systems running it.

See how AI is being used on both sides of the threat landscape in this eBook 👉 ow.ly/pKit50YAYGt

#AI #cybersecurity #OT #IoT #ICS

0 0 0 0
Original post on securityboulevard.com

Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life March 2026 marks passwordless tipping point: Microsoft forces passkey migratio...

#Identity #& #Access #IoT #& #ICS #Security […]

[Original post on securityboulevard.com]

0 0 0 0

Verpassen Sie keine Ausgabe und bleiben Sie auf dem neuesten Stand, um die digitale Sicherheit zu stärken!

👉 Jetzt anmelden: www.gai-netconsult.de/security-jou...

#SecurityJournal #CyberSecurity #Informationssicherheit #Sicherheitsmanagement #ICS #OTSecurity #RiskManagement #StaySecure

0 0 0 0
Original post on iiot-world.com

How One Utility Secured 650,000 Power Connections With estimated cybercrime costs reaching $10.5 trillion between 2020 and 2025, the energy sector has become a primary target internationally. Recor...

#Cybersecurity #Energy #ICS #Security #Content #Disarm […]

[Original post on iiot-world.com]

0 0 0 0
[Audio] Original post on securityboulevard.com

The Hidden Tracking Risk Inside Your Tires In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because...

#Data #Security #IoT #& #ICS #Security […]

[Audio] [Original post on securityboulevard.com]

1 0 0 0
Why are executives enamored with AI but ICs aren't? | John Wang John Wang's personal website

More interesting discussion in the HN comments:

“Why Are Executives Enamored With AI But ICs Aren’t?”, John Wang (johnjwang.com/post/2026/03...).

Via HN: news.ycombinator.com/item?id=4754...

#AI #LLMs #SoftwareEngineering #Executives #Management #Business #ICs #Leaders #Quality

2 0 0 0
Ransomware Dip Masks Alarming Rise in Nation-State Attacks on Critical Infrastructure The Waterfall Threat Report 2026 indicates a temporary slowdown in ransomware is masking a dangerous trend: a doubling of nation-state and hacktivist attacks on critical infrastructure.

📊 THREAT REPORT: Ransomware attacks with physical impact fell 25% in 2025, but nation-state attacks on critical infrastructure DOUBLED. The slowdown is likely temporary. 🏭 #ThreatIntel #ICS #CriticalInfrastructure

0 0 0 0
Preview
Diagnosing multimodal disinformation: the integrative ‘Three-M' framework of multimodality, manipulation, and malintent The ubiquity of short-video platforms (e.g., TikTok, Douyin, Kuaishou) has amplified the circulation of multimodal disinformation. To address this challenge, this study proposes an integrative theo...

#OutNow in #iCS

How should multimodal disinformation be analysed? This article proposes the Three-M framework, arguing that multimodality, manipulation, and malintent must be examined together.

doi.org/10.1080/1369...

1 0 0 0
Preview
Protecting democracy: comparing codes of conduct for generative AI use during elections 2024 has been called the ‘super election year’ with more than four billion citizens participating in national elections in 74 countries. The introduction of Generative Artificial Intelligence was d...

#OutNow in #iCS

From voluntary guidelines to mandatory rules, this article compares emerging election-time AI codes across 11 countries and assesses their enforceability and clarity.

doi.org/10.1080/1369...

1 0 0 0
Preview
Style and substance on The Alex Jones Show predict InfoWars sales: a multi-modal analysis of a media empire Alex Jones, a prominent conspiracy theorist, has garnered substantial influence and wealth through his InfoWars media empire, which includes The Alex Jones Show and InfoWars.com. This study leverag...

#OutNow in #iCS

This article examines the business model of disinformation through the case of InfoWars. By linking broadcast features to next-day sales, it shows how media style and commercial incentives reinforce one another.

doi.org/10.1080/1369...

2 0 0 0
Preview
From tech wars to tech culture wars? ‘Values shaping’ and ‘values signaling’ in AI system design and governance As Artificial intelligence (AI) systems are becoming increasingly sophisticated in emulating human communication and expressing social values, they also gain greater relevance for questions of cult...

#OutNow in #iCS

As generative AI systems increasingly express social values, conflicts shift from technical competition to cultural contestation. This article theorises values shaping and values signalling in AI design and governance.

doi.org/10.1080/1369...

0 0 0 0
Preview
Payment systems and priorities: artists’ fragmented perspectives on music streaming reforms The debate around alternative payment systems on music streaming has been active for over a decade but it was not until 2024 that the platforms Spotify and Deezer announced their first changes to t...

#OutNow in #iCS

In this article, Jensen explores how artists understand and evaluate music-streaming payment systems, showing why reform debates often clash with everyday career realities and with opaque payout structures.

doi.org/10.1080/1369...

1 0 0 0
Preview
‘Spread kindness not virus’: theorising the vulnerability of online mutual aid communities While rooted in altruism and solidarity, the sustainability of mutual aid communities – particularly those born in times of crisis – depends on their capacity to maintain social cohesion and ensure...

#OutNow in #iCS

Using Michel Serres’ parasite logic and a netnographic study of a large Facebook caremongering community, this article uncovers interferences that both threaten and sustain solidarity in digital mutual aid.

doi.org/10.1080/1369...

1 0 0 0

#ICS #OT crowd: I'm looking for "Production Line Design for Dummies"-type resources. I'm primarily interested in high-level best practices, rules of thumb for making industrial processes work reliably, ELI5 level is sufficient. Let's say I want to build a lemonade factory for my
1/2

0 0 1 0
Post image

Think antivirus and firewalls are enough? That assumption can leave critical gaps especially in OT/ICS.

In our latest OT Myths post we explore why perimeter defenses fall short and what a layered approach really looks like.

Read 👉 enaxy.com/2026/03/myth...

#OTSecurity #ICS #Cybersecurity #Enaxy

0 0 0 0
Post image

Poland saw 270,000 cyberattacks in 2025 - up 2.5x.

Energy infrastructure hit with destructive malware, not ransomware.

Is this the new normal for cyber warfare?

#Cybersecurity #ThreatIntel #ICS

0 0 1 0
Post image

Only 18 days of Early Bird left! #SOA26

💡ICS members: Early Bird is additional to the reduced member rate, the best price on your tickets.

✨Non-members also save significantly by booking before the deadline!

Secure your place: ow.ly/gsBW50YyuGk

#IntensiveCare #CriticalCare #ICU #ICS #Congress

0 0 1 0
Original post on iiot-world.com

Achieving Regulatory Compliance for Connected Devices in Global Smart Manufacturing & Critical Infrastructure Achieving regulatory compliance for connected devices is a fundamental condition of...

#ICS #Security #Industrial #IoT #connected #devices #CRA […]

[Original post on iiot-world.com]

0 0 0 0
Mashup between Pomni from The Amazing Digital Circus, and (the character colloquially known as) Nia from I Can't Sleep.

Mashup between Pomni from The Amazing Digital Circus, and (the character colloquially known as) Nia from I Can't Sleep.

Pomni, but she can't sleep and has schizophrenic visions and paranoia.

#TheAmazingDigitalCircus #TADC #Pomni #TADCPomni
#ICan'tSleep #ICantSleep #ICS #nosleep666 #Nia #ICSNia

23 5 0 0
Poland Reports 150% Surge in Cyberattacks, Cites Unprecedented Assault on Energy Grid A Polish government official has revealed that the country experienced a 150% increase in cyberattacks in 2025, including a sophisticated attack on the nation

🇵🇱 Poland reports a 150% surge in cyberattacks in 2025, including an 'unprecedented' assault on its energy grid. Officials suspect Russian state actors in the attack on a major power plant. #CyberAttack #Poland #Russia #ICS #EnergySector

0 0 0 0
Preview
Dark Web Intelligence on X: "🌡️ Claimed ICS Manipulation — Greenhouse Climate System Targeted A threat actor claims to have compromised an industrial greenhouse environmental control system in Turkey, allegedly manipulating temperature and ventilation settings. According to the post, the attacker states https://t.co/H9Y7BjTphB" / X 🌡️ Claimed ICS Manipulation — Greenhouse Climate System Targeted A threat actor claims to have compromised an industrial greenhouse environmental control system in Turkey, allegedly manipulating temperature and ventilation settings. According to the post, the attacker states https://t.co/H9Y7BjTphB

Dark Web Intelligence reports an attack on Turkish SCADA/HMI systems carried out by the Armenian Code hacker group. I wrote about her in my posts earlier x.com/DailyDarkWeb...

#CyberSecurity #ICS #OTSecurity #CriticalInfrastructure #CyberThreatIntelligence #Hacktivism #Infosec #IoT #CyberWar

0 1 1 0
Preview
CVE-2026-3587: CWE-912 Hidden Functionality in WAGO Lean Managed Switch 852-1812 CVE-2026-3587 identifies a critical security vulnerability in the WAGO Lean Managed Switch 852-1812, a network device used for industrial and enterprise network management. The vulnerability is classified under CWE-912, which involves hidde

CRITICAL: WAGO 852-1812 switch vuln (CVSS 10.0) lets unauth attackers gain root via hidden CLI. No patch — isolate and restrict access now! radar.offseq.com/threat/cve-2026-3587-cwe... #OffSeq #ICS #Vulnerability

0 1 0 0
Original post on iiot-world.com

Securing Automation: Why the Specification Stage Is the Right Time to Embed OT Cybersecurity Manufacturers are excited about 2026. The latest Sikich Industry Pulse shows that 65 % of respondent...

#Cybersecurity #ICS #Security #automation #security #Cyber […]

[Original post on iiot-world.com]

0 0 0 0
Post image

So this is my Sunday afternoon... what are you up to?
#ICS #incidentcommandsystem #justiceinstitute #JIBC

0 0 0 0

Been a while since Elon's made a big, flashy announcement about anything, but he made one today, about a chip fabricating factory...
x.com/SawyerMerrit...
#SpaceX #ElonMusk #ICs

0 0 0 0
Preview
CVE-2026-24060: CWE-319 in Automated Logic WebCTRL Premium Server CVE-2026-24060 is a vulnerability classified under CWE-319 (Cleartext Transmission of Sensitive Information) affecting Automated Logic's WebCTRL Premium Server. The issue arises because service information transmitted over the network as BA

CRITICAL: WebCTRL Premium Server leaks BACnet data in cleartext (CVE-2026-24060). Attackers can intercept or tamper remotely. Segment networks & encrypt traffic until patched. radar.offseq.com/threat/cve-2026-24060-cw... #OffSeq #ICS #CyberAlert

0 0 0 0
Post image

ICS is widely used in North America and adapted around the world.
IMTA wants to learn from our international colleagues.
How are you using ICS?
What works?
What have you adapted to fit your environment?
Global Incident Leadership starts with listening.
#ICS #IMTA

1 1 0 0