The ability to connect IT and operational systems comes with considerable risk, says AVeS Cyber Security.
The malware enables the criminals to execute all common tasks, as well as intercept network traffic, says Kaspersky Lab.
Most threats come via the Internet, which has become the main source of infection for industrial control system computers, says Kaspersky Lab.
The platform is able to detect attacks before they occur, by employing big data and artificial intelligence, says Panda Security.
Botnet ownership is expensive, and to make a profit, criminals must be able to use each and every opportunity to get money out of malware, says Kaspersky Lab.
No financial data, such as credit card information or social security numbers, was compromised but over 2.3 million customers were affected, says T-Mobile.
The wireless services consumer watchdog updates its code of conduct to address the mobile risks posed by malware and ransomware.
Upon installation, the Trojan provides attackers with almost unlimited access to the attacked computer, says Kaspersky Lab.
The ransom varies from 15 to 50 BTC, and has already netted the attackers more than $640 000, says Check Point.
Over and above disruption, cyber extortion has emerged as a motivating factor behind attacks on operational technology environments, says PwC.
Based on an advertisement in underground forums, it seems operators are peddling Princess Evolution as a ransomware as a service, says Trend Micro.
Companies can improve their security IQ by implementing education and training programmes for employees.