#OutNow in #iCS
Do warning labels reduce the impact of AI-generated political disinformation? Drawing on Third-Person Effect theory, this study shows how labels shape perceptions, policy support, and preventive behaviour.
doi.org/10.1080/1369...
#OutNow in #iCS
While some research frames political microtargeting as harmful. Matthes and colleagues instead ask whether perceived fit in targeted ads can cultivate political interest and campaign knowledge over time.
doi.org/10.1080/1369...
Information, Communication & Society. #OutNow in #iCS
How should data governance be rethought in light of democracy’s crisis? Bou Nassar and Calleja-López draw on Nancy Fraser to situate data extractivism within a neo-Marxian analysis of democratic erosion.
#OutNow in #iCS
How should data governance be rethought in light of democracy’s crisis? Bou Nassar and Calleja-López draw on Nancy Fraser to situate data extractivism within a neo-Marxian analysis of democratic erosion.
doi.org/10.1080/1369...
#OutNow in #iCS
Do metaphors increase political engagement online? This study analyses 4,131 tweets from the 2023 Turkish general election to examine how metaphor frequency and originality shape user reactions and interactions.
doi.org/10.1080/1369...
#OutNow in #iCS
In this qualitative paper, Riedl examines how dating app users in the United States navigate safety on Tinder and Bumble, arguing that users rely on community-based strategies rather than platform governance alone.
doi.org/10.1080/1369...
#OutNow in #iCS
Focusing on the Roman Zadorov murder case in Israel, this paper investigates how perceived media exposure drives public engagement and influences opinions about guilt and institutional performance.
doi.org/10.1080/1369...
CRITICAL: Honeywell IQ4E (v3.50_3.44) lacks HMI authentication by default. Remote attackers can seize admin control & lock out users. Create user accounts + restrict access now! radar.offseq.com/threat/cve-2026-3611-cwe... #OffSeq #Honeywell #ICS
Both provide visibility into different parts of the security program, but neither works without a baseline of accurate asset records.
What reaches leadership in your organization, detection counts or documented gap closures? 👇
#OTsecurity #ICS #OTengineering #IndustrialCybersecurity #AssetInventory
OT/ICS penetration testing can uncover real vulnerabilities—but only if you’re ready for it.
Brandon Workentin explores what organizations should consider before bringing penetration testing into industrial environments.
enaxy.com/2026/03/ot-i...
#OTSecurity #ICS #Cybersecurity #Enaxy
CVE-2026-2364: HIGH severity TOCTOU bug in CODESYS Installer enables local privilege escalation if a user confirms updates. Restrict access, monitor, and await patch. radar.offseq.com/threat/cve-2026-2364-cwe... #OffSeq #CODESYS #ICS
CRITICAL: DeltaWW COMMGR2 hit by stack buffer overflow (CVE-2026-3630, CVSS 9.8). Remote RCE possible, no patch yet. Segment networks & monitor now! radar.offseq.com/threat/cve-2026-3630-cwe... #OffSeq #ICS #Vuln
Atop EHG2408 switches face CRITICAL risk (CVE-2026-3823): unauthenticated remote code exec via buffer overflow. No patch yet — segment and restrict access ASAP. radar.offseq.com/threat/cve-2026-3823-cwe... #OffSeq #ICS #SecurityAlert
A new threat actor has emerged in the arena of cybercriminals who hack into HMI/SCADA systems. This is the pro-Armenian hacker group Armenian code t.me/armeniancode... #Azerbaijan #Armenia #ICS #OTSecurity #CriticalInfrastructure #CyberThreatIntelligence #Infosec #CyberSecurity #Hacktivism
CRITICAL: DeltaWW COMMGR2 hit by CVE-2026-3630 (CVSS 9.8) — unauthenticated RCE, no patch yet. Segment networks & monitor for threats ASAP. Details: radar.offseq.com/threat/cve-2026-3630-cwe... #OffSeq #ICS #Vulnerability
Industrial perimeter defenses strained by segmentation gaps, legacy ICS systems, vendor access risks Industrial perimeter defense continues to be challenged as cyber threats and attacks on OT (oper...
#AI #Attacks #and #Vulnerabilities #Control #device […]
[Original post on industrialcyber.co]
SICK Lector85x CRITICAL vuln: Remote, unauth'd attackers can alter configs via exposed CROWN REST directories. Patch or restrict access now to protect OT environments. radar.offseq.com/threat/cve-2026-2330-cwe... #OffSeq #ICS #Vulnerability
ICS is widely used in North America and adapted around the world.
IMTA wants to learn from our international colleagues.
How are you using ICS?
What works?
What have you adapted to fit your environment?
Global Incident Leadership starts with listening.
#ICS #IMTA
Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks The vulnerability was disclosed and mitigated in 2021 but its in-the-wild exploitation has only now come to light. The post R...
#ICS/OT #Vulnerabilities #CISA #KEV #exploited #ICS #OT […]
[Original post on securityweek.com]
#OutNow in #iCS
With data from 35 countries, this article shows that problematic social media use is associated with poorer adolescent well-being, with stronger effects among socioeconomically disadvantaged individuals.
doi.org/10.1080/1369...
#OutNow in #iCS
This article presents the AI-Based Risk Information-Seeking Model (ARISM), a tool for understanding how users seek risk information in AI environments. Results show that privacy concerns and AI anxiety shape intentions to use chatbots.
doi.org/10.1080/1369...
#OutNow in #iCS
This article examines how election management bodies in Australia and the UK address electoral disinformation. It identifies institutional constraints and cautious intervention strategies.
doi.org/10.1080/1369...
#OutNow in #iCS
ABLE-S offers a new tool to assess serious games across both learning and gameplay dimensions. Developed and validated through multiple studies, the scale demonstrates strong reliability and cross-sample stability.
doi.org/10.1080/1369...
#OutNow in #iCS
This study embeds digital nudging within the bystander intervention model to test responses to anti-LGBTQIA+ attacks. It finds that the hostility type shapes intervention more consistently than nudges do.
doi.org/10.1080/1369...
CRITICAL: SICK Lector85x v2.6.0 lets attackers access & modify files, run code with no auth (CVE-2026-2331). Restrict HTTP access, monitor logs, rotate creds. Contact SICK AG for updates. radar.offseq.com/threat/cve-2026-2331-cwe... #OffSeq #ICS #Vul...
ICS is widely used in North America and adapted around the world.
IMTA wants to learn from our international colleagues.
How are you using ICS?
What works?
What have you adapted to fit your environment?
Global Incident Leadership starts with listening.
#ICS #IMTA
FYI - 'Threat groups are weaponizing industrial control access they’ve gained over the years, but critical infrastructure operators remain unprepared for what comes next, research from Dragos suggests'
-
www.csoonline.com/article/4140... #cybersecurity #OT #CNI #ICS #NationStateAttackers
When remediation windows are limited, what actually determines priority, CVSS score or asset context? 👇
#OTsecurity #ICS #IndustrialCybersecurity #OTengineering #OTVisibility
What Makes Audio Processor Circuits Crucial for High Performance Audio Systems?
#audio processor circuits #enrgtech #electronics #electronic components #technology #ics #chips