To compete in today’s market driven global economy, businesses opt for control systems that automatically manage processes. ICS enables efficiency, but are connected, heightening threat exposure and corresponding business risks.
This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.
The ICS-CERT released a security bulletin that detailed a vulnerability in the technology used to control the systems used by power plants. If exploited, cybercriminals could gain control of such facilities, effectively crippling the national infrastructure.
A custom honeypot was used to test the security of US automated gas tank systems. How are attackers abusing the system and which targets did they prefer?
As smart devices become more prevalent and are used in critical situations, software developers will have to understand that they now have a greater responsibility to keep their software products safe.
This research provides a comprehensive look into the security challenges and attacks on critical infrastructure that member states of the Organization of American States had to face in 2014.
The security of an enterprise is not only dependent on the organization itself, but also on the security of their IT supply chain and contractors. These represent potential weak points into the security of any organization.
Attackers are actively attempting to compromise Internet-facing gas pump monitoring systems. We began searching for these devices to see if we could glean any intelligence on attacks that have occurred against these devices.