Skip to content

Grids & Integration

Cyber threats for PV: What are credential compromise attacks and how do they work

Credential compromise attacks allow adversaries to gain unauthorized access to PV systems by stealing or guessing valid login credentials, enabling them to manipulate operations, disrupt monitoring, or take control of critical assets. These attacks can lead to operational instability, reduced energy production, and safety risks, making strong authentication and access control essential for system resilience.

Free midday electricity key to drive consumer demand to match excess PV generation

Free midday electricity schemes aim to shift household demand into periods of high solar PV generation, reducing midday surplus and evening fossil-fuel ramp-up. Research on Australia’s Solar Sharer program suggests such incentives could significantly improve renewable utilization, but outcomes depend on consumer behaviour, load shifting, and rebound effects.

Cyber threats for PV: What are ransomware attacks and how do they work

Ransomware attacks encrypt or lock critical PV system data and control platforms, preventing operators from accessing or managing their assets until a ransom is paid. These attacks can disrupt operations, reduce energy production, and create safety risks, making robust backups, segmentation, and incident response essential for resilience.

Managing cyber risks in the era of decentralized energy

The move toward decentralized energy resources offers resilience and flexibility in power generation, but it also introduces new complexities that demand proactive security measures.

Cyber threats for PV: What are man-in-the-middle attacks and how do they work

Man-in-the-middle attacks are a serious threat to networked PV systems, allowing attackers to intercept, modify, or disrupt communications, potentially causing operational failures, physical damage, financial losses, and safety hazards. Effective defense requires a layered approach combining encryption, strong authentication, network segmentation, firewalls, IDS, and continuous monitoring to detect, prevent, and limit the impact of such attacks.

Solar PV, geothermal hybrid systems are more than niche solutions

Solar energy, driven by excellent resource conditions and rapidly improving economic attractiveness, is expected to emerge as a bulk energy supplier in future energy systems. The self-limiting effects of solar power can be circumvented through solar-hybrid solutions, such as PV-geothermal hybrid configurations.

How Switzerland plans to integrate 40 GW of solar by 2050

Swiss national grid company Swissgrid teamed up with a group of Swiss energy expects to publish a white paper covering how Switzerland can integrate up to 40 GW of solar by 2050 while maintaining safe and reliable operation of the grid.

AI-enabled hacks expose remote shutdown risk in microinverters

IT security firm Jakkaru has identified a vulnerability in microinverters from AP Systems that could enable a “kill switch” scenario, potentially shutting down tens of thousands of inverters simultaneously and disrupting grid operations.

All emerging cyber threats targeting power infrastructure at a glance

Researchers in Moroco analyzed cybersecurity challenges in smart grids, highlighting AI-driven detection and defense strategies against threats like distributed denial-of-service, false data injection replay, and IoT-based attacks. They recommend multi-layered protections, real-time anomaly detection, secure IoT devices, and staff training to enhance resilience and safeguard power system operations.

New intrusion detection systems boost protection of SCADA systems against cyber threats

An international reserch team developed two deep learning-based IDS models to enhance cybersecurity in SCADA systems. The hybrid approach reportedly improves detection of complex and novel cyber threats with high accuracy, adaptability, and efficiency, outperforming traditional methods across multiple datasets.

This website uses cookies to anonymously count visitor numbers. View our privacy policy.

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close