#dcs

[ follow ]
#malware
Information security
fromSecurityWeek
1 week ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Information security
fromSecurityWeek
1 week ago

ZionSiphon Malware Targets ICS in Water Facilities

ZionSiphon is a new malware targeting water treatment plants in Israel, designed to manipulate chlorine levels and pressure in these facilities.
Startup companies
fromFast Company
1 day ago

This autonomous welding robot may be the future of advanced manufacturing

The U.S. faces a significant shortage of welders, necessitating over 320,000 new professionals by 2030, while robotics may help address this gap.
#automation
Artificial intelligence
fromThe Village Voice
1 day ago

Dhruv Jaglan and Georgi Boby on Building Automation That Learns from Users - The Village Voice

Automation in digital work enhances efficiency, but non-engineering functions struggle with adoption due to technical barriers.
Business intelligence
fromBusiness Matters
1 week ago

Enhancing Industrial Efficiency with High-Speed Robot Palletizers

High-speed robot palletizers enhance efficiency in manufacturing by automating the stacking of products, significantly improving throughput and reducing manual labor.
Artificial intelligence
fromThe Village Voice
1 day ago

Dhruv Jaglan and Georgi Boby on Building Automation That Learns from Users - The Village Voice

Automation in digital work enhances efficiency, but non-engineering functions struggle with adoption due to technical barriers.
Business intelligence
fromBusiness Matters
1 week ago

Enhancing Industrial Efficiency with High-Speed Robot Palletizers

High-speed robot palletizers enhance efficiency in manufacturing by automating the stacking of products, significantly improving throughput and reducing manual labor.
#robotics
Business
from24/7 Wall St.
19 hours ago

The Humanoid Robot Boom Is Here. These 3 ETFs Capture the Entire Supply Chain

Robotics and automation are integral to modern supply chains, with significant investments and deployments across various industries.
Science
fromwww.npr.org
1 day ago

'Self-aware' robots can learn complex tasks by watching humans. Is that a good thing?

Robotics scientists in Switzerland are advancing robots' ability to perform complex tasks through new adaptive learning methods.
London startup
fromTheregister
3 weeks ago

Humanoid tests humanoid robot for automotive logistics

Humanoid's robot successfully completed a proof-of-concept test for automotive manufacturing, demonstrating its capability in a production environment.
Business
from24/7 Wall St.
19 hours ago

The Humanoid Robot Boom Is Here. These 3 ETFs Capture the Entire Supply Chain

Robotics and automation are integral to modern supply chains, with significant investments and deployments across various industries.
Science
fromwww.npr.org
1 day ago

'Self-aware' robots can learn complex tasks by watching humans. Is that a good thing?

Robotics scientists in Switzerland are advancing robots' ability to perform complex tasks through new adaptive learning methods.
London startup
fromTheregister
3 weeks ago

Humanoid tests humanoid robot for automotive logistics

Humanoid's robot successfully completed a proof-of-concept test for automotive manufacturing, demonstrating its capability in a production environment.
Business intelligence
fromDevOps.com
19 hours ago

Why Contact Enrichment Belongs in Your Application Architecture, Not Your Sales Workflow - DevOps.com

B2B applications often collect incomplete data, which can be resolved by integrating contact enrichment at the data ingestion point.
#ai
Germany news
fromThe Local Germany
3 days ago

AI-powered robots offer new hope to German factories

Humanoid robots showcased at a trade fair highlight AI's potential to revitalize German industry amid competition from China.
DevOps
fromTechRepublic
2 days ago

AI Demand Is Forcing a Rethink of Data Center Power, Cooling

AI's rapid growth is challenging data center infrastructure, necessitating rethinking of power, cooling, and construction strategies.
Information security
fromSecurityWeek
2 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
DevOps
fromDevOps.com
1 day ago

How to Manage Operations in DevOps Using Modern Technology - DevOps.com

Operations in DevOps now involves supporting faster releases, managing cloud-native environments, improving security, and ensuring reliability at scale.
Environment
fromBig Think
2 days ago

The power grid is breaking. Can it fix itself?

A deliberate power outage affected 50,000 people in Colorado due to high winds, highlighting vulnerabilities in America's power grid.
Cars
fromFast Company
3 days ago

AI is eliminating one of the biggest bottlenecks of car design

Aerodynamics significantly influence vehicle design, and AI is accelerating aerodynamic analysis, improving efficiency in car production.
Silicon Valley
fromABC7 San Francisco
3 days ago

Union City becomes home to 1st US center for advanced AI chip assembly

Union City opened the first U.S. research center for advanced semiconductor packaging, enhancing AI chip production and job creation in Silicon Valley.
European startups
fromTNW | Launch
3 days ago

OpenAI takes Codex into enterprise software shops worldwide

OpenAI partners with consulting firms to expand Codex's reach into enterprises lacking internal capabilities for implementation.
Information security
fromTechzine Global
1 day ago

Agentic AI is reshaping the network - and it's time to upgrade

Wireless connectivity is essential for AI, transforming industries and requiring strategic management to address complexity and security risks.
Software development
fromComputerWeekly.com
1 day ago

AI drives software productivity - and challenges - for Motorway | Computer Weekly

Engineering teams can now treat code as disposable, increasing productivity and speed in software development with AI-driven tools.
fromHarvard Business Review
1 day ago

The End of One-Size-Fits-All Enterprise Software

Generative AI is dissolving the economic logic that made standardized enterprise software the only practical choice for most companies. What replaces it will be shaped not just by the rapidly evolving capabilities of this new technology, but by leaders willing to ask a harder question: Which workflows do we actually need to own?
Startup companies
European startups
fromTNW | Robots
5 days ago

Siemens and Humanoid deployed an Nvidia-powered humanoid robot

Siemens, Nvidia, and Humanoid deployed an AI-powered robot in live logistics at a Siemens factory, achieving high efficiency and integration with production systems.
#agentic-ai
Software development
fromDevOps.com
1 day ago

Agentic AI for Defense: How Checkmarx Turns Security into a Coding Partner - DevOps.com

Agentic AI proactively identifies and addresses security vulnerabilities in real-time during code development, enhancing application security significantly.
fromMedium
1 month ago
Artificial intelligence

From Dumb Devices to Digital Teammates: How Agentic AI is Revolutionizing the Internet of Things

Information security
fromSecurityWeek
22 hours ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
Software development
fromDevOps.com
1 day ago

Agentic AI for Defense: How Checkmarx Turns Security into a Coding Partner - DevOps.com

Agentic AI proactively identifies and addresses security vulnerabilities in real-time during code development, enhancing application security significantly.
Artificial intelligence
fromMedium
1 month ago

From Dumb Devices to Digital Teammates: How Agentic AI is Revolutionizing the Internet of Things

Agentic AI transforms IoT from obedient automation into intelligent systems that anticipate needs, reason through problems, and take initiative rather than simply following programmed commands.
Artificial intelligence
fromMedium
3 days ago

Enterprise AI in Practice: 6 Must-Watch Sessions on Scaling Agentic Systems

Enterprise AI is transitioning from experimentation to execution, presenting challenges in governance, scaling, and measurable business impact.
Digital life
fromEarth911
2 weeks ago

Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness

Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
Online learning
fromeLearning Industry
3 weeks ago

From Manual To Intelligent: How AI Automation Is Reshaping L&D Operations

AI automation can alleviate operational burdens on L&D teams, allowing them to focus on strategic tasks and improve learning quality.
DevOps
fromComputerWeekly.com
5 days ago

Storage implications of a modern IT architecture | Computer Weekly

Organizations are increasingly using containers to modernize applications and manage both cloud-native and traditional workloads with Kubernetes.
Information security
fromNextgov.com
2 days ago

Microsoft to test third-party AI models for incorporation in its security offerings

Microsoft is evaluating third-party AI systems to enhance its cybersecurity measures against AI-driven threats.
Information security
fromSecurityWeek
2 days ago

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

SBOMs and VEX statements fail to enhance software supply chain security due to poor decision-making and inconsistent interpretation of available data.
Information security
fromSecuritymagazine
5 days ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
#ai-agents
Artificial intelligence
fromMedium
1 week ago

Why Your AI System Is Open-Loop

Open-loop AI systems audit spending after the fact, while closed-loop systems proactively control costs through continuous measurement and adjustment.
Information security
fromThe Hacker News
4 days ago

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

A critical vulnerability in the Model Context Protocol allows remote code execution, affecting over 7,000 servers and compromising sensitive data.
DevOps
fromInfoWorld
3 weeks ago

How to build an enterprise-grade MCP registry

MCP registries are essential for integrating AI agents with enterprise systems, requiring semantic discovery, governance, and developer-friendly controls.
#ics-security
Information security
fromSecurityWeek
1 week ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Information security
fromSecurityWeek
1 week ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
#artificial-intelligence
Miscellaneous
fromComputerWeekly.com
1 month ago

Render Networks unveils synchronised agentic critical infrastructure architecture | Computer Weekly

Render Networks expands ClearWay platform to automate critical infrastructure deployment, reducing capital risk through real-time field verification and audit-grade accountability across complex multi-asset projects.
DevOps
fromInfoQ
1 month ago

Configuration as a Control Plane: Designing for Safety and Reliability at Scale

Configuration in cloud-native systems is a dynamic control plane that directly influences system behavior and reliability at runtime.
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Why long range communication is useful for industrial monitoring - London Business News | Londonlovesbusiness.com

Long-range radio waves can pass through obstacles more easily, which makes them perfect for monitoring expansive factories or outdoor infrastructure. A recent report by Fabrity highlighted that these systems use very little power. This allows sensors to operate for 5 to 10 years on a single battery. Using such tech means you do not have to install expensive wiring across your entire site.
Roam Research
EU data protection
fromInfoWorld
2 months ago

Three ways AI will change engineering practices

AI can automate initial technical documentation while increasing compliance demands, requiring visibility, strict data-access controls, guardrails, and security permissions to protect sensitive data.
Gadgets
fromComputerWeekly.com
2 months ago

Direct-to-device connectivity set to underpin next generation of industrial IoT | Computer Weekly

Ubiquitous satellite direct-to-device (D2D) connectivity will drive rapid, near-term mass adoption in industrial IoT across agriculture, mining, energy, transport and utilities.
Marketing tech
fromExchangewire
1 month ago

Automation vs Control: Striking the Balance with AI

AI automation in advertising is reducing agency roles and advertiser control, yet advertisers remain responsible for campaign outcomes as platforms like Meta push full automation.
Gadgets
fromFuturism
2 months ago

They Gave a Robot a Sword

A humanoid Robotera L7 performs dynamic swordplay with advanced motor skills, demonstrating 55 degrees of freedom and impressive full-body agility.
#ai-infrastructure
fromArs Technica
2 months ago

What happens to a car when the company behind its software goes under?

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
Cars
Business
fromThe Verge
2 months ago

Siemens CEO Roland Busch's mission to automate everything

Siemens aims to automate entire factory processes with AI, spanning physical manufacturing and digital operations, with major implications for jobs and global trade.
Gadgets
fromFast Company
2 months ago

This simple robot could drastically speed up data center construction

An autonomous drill robot drills thousands of precise concrete-floor holes for data centers up to ten times faster, operating 24/7 with 99.97% accuracy.
Startup companies
fromBusiness Insider
2 months ago

How robotics could upend the US manufacturing industry

Machina Labs promotes distributed, flexible, portable robotics-enabled manufacturing to leapfrog centralized factories and accelerate U.S. reindustrialization in defense, aerospace, and automotive sectors.
fromThe Atlantic
2 months ago

Smart Homes Are Terrible

All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
Gadgets
Artificial intelligence
fromFuturism
1 month ago

Factory Paying Human Worker to Watch Robot Worker All Day

Humanoid robots like Digit are being deployed in factories with human supervisors, with costs expected to drop from $10-$25 per hour to $2-$3 per hour, potentially displacing workers earning $20 per hour.
Information security
fromTechRepublic
1 month ago

Industrial Systems Under Siege: 77% of OT Environments Suffer Cyber Breaches

Industrial sectors lag in cybersecurity despite modernizing operational technologies, creating critical vulnerabilities in manufacturing, utilities, and energy infrastructure.
Gadgets
fromComputerWeekly.com
1 month ago

Connectivity, AI drive fleet safety, productivity and decision-making | Computer Weekly

AI, connected data, and safety-focused services are transforming fleet operations, with GPS tracking adoption at record highs and AI delivering measurable safety improvements and cost reductions.
Information security
fromTechzine Global
1 month ago

Harness secures AI code and AI apps with two new modules

Harness launches AI Security and Secure AI Coding modules to detect, test, and protect AI components throughout the application lifecycle while scanning AI-generated code for vulnerabilities in real time.
fromDevOps.com
2 months ago

How AI Is Expanding Who Gets to Build Infrastructure - DevOps.com

Baron traces the origin story back to his time building high-scale systems at Instana (which exited to IBM in 2020), where the reality of "always-on" platforms made one thing obvious: the tooling we rely on is often too low-level, too rigid, and too disconnected from real-world use cases. That gap has only widened as environments have exploded in complexity-more cloud providers, more managed services, more hybrid setups, more internal APIs, and "gillions" of tools stitched together into brittle workflows.
Software development
Information security
fromSecurityWeek
1 month ago

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric

Industrial control system manufacturers Siemens, Schneider Electric, Mitsubishi Electric, and Moxa released multiple security advisories addressing critical and high-severity vulnerabilities in their ICS products.
fromSecurityWeek
2 months ago

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact

Siemens has published eight new advisories. The company has released patches and mitigations for high-severity issues in Desigo CC, Sentron Powermanager, Simcenter Femap and Nastran, NX, Sinec NMS, Solid Edge, and Polarion products. A medium-severity flaw has been found in Siveillance Video Management Servers. Exploitation of the vulnerabilities can lead to unauthorized access, XSS, DoS, code execution, and privilege escalation.
Information security
Artificial intelligence
fromDevOps.com
2 months ago

When Open Networks Meet AI Coding: A Tsunami of Smart Enterprise Apps - DevOps.com

Telcos are exposing programmable network APIs while AI code-generation accelerates development, enabling rapid creation of network-aware enterprise applications.
Artificial intelligence
fromTechzine Global
2 months ago

IFS gives industrial AI ecosystem leg up through partnerships

IFS is building an AI ecosystem through strategic partnerships to deliver measurable industrial and physical AI solutions integrated into customer operations.
fromSecurityWeek
1 month ago

Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks

The vulnerability, related to an insufficiently protected cryptographic key, could allow a remote, unauthenticated attacker to bypass verification and connect to a targeted controller by mimicking an engineering workstation. In a real-world industrial environment, the vulnerability could allow remote attackers to manipulate PLC logic and disrupt manufacturing processes, or even cause physical damage to equipment.
Information security
fromSecurityWeek
2 months ago

Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems

The Indurex platform ingests and correlates data from multiple sources across the cyber-physical stack, with a strong focus on industrial historians, instrumentation and asset management systems (IAMS), alarm management, and OT network and endpoint data. The platform, which can be integrated with third-party OT security solutions, is designed to unify cyber, process, and safety context into a single operational view, using adaptive risk scoring to highlight issues and prioritize response actions.
Information security
Information security
fromThe Hacker News
1 month ago

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA added two critical vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromComputerworld
2 months ago

AI will likely shut down critical infrastructure on its own, no attackers required

Misconfigured AI controlling cyber-physical systems can unintentionally shut down national critical infrastructure in a G20 country by 2028.
fromdzone.com
2 months ago

Managing Changing Hardware/Peripherals in a Robust POS

Retail point-of-sale systems today offer a wide range of options for peripherals and hardware. Their technical specifications play a major role in selection, and big retailers often choose multiple vendors to reduce a single point of failure. This gives them an advantage to negotiate price or support as well. Technically, these peripherals also require updating with new models and may have new feature sets. This necessitates the redevelopment of point-of-sale applications, increasing development costs.
Information security
fromThe Hacker News
2 months ago

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

The findings are based on several years of deploying OMICRON's intrusion detection system (IDS) StationGuard in protection, automation, and control (PAC) systems. The technology, which monitors network traffic passively, has provided deep visibility into real-world OT environments. The results underscore the growing attack surface in energy systems and the challenges operators face in securing aging infrastructure and complex network architectures.
Information security
Information security
fromSecurityWeek
2 months ago

3 Threat Groups Started Targeting ICS/OT in 2025: Dragos

Three new threat groups—Sylvanite, Azurite, and Pyroxene—began targeting ICS and OT in 2025, expanding threats to critical infrastructure globally.
Information security
fromSecuritymagazine
1 month ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
[ Load more ]