ICS/SCADA
- August 08, 2016By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions.
- August 05, 2016This research paper looks at who are continuing to attack external-facing ICS devices and why, and provides attack statistics, in-depth analysis of the threat actors, and their possible motivations.
- July 23, 2016Beyond all the doom-laden headlines on a possible "digital Pearl Harbor" scenario, how great is the actual risk and where is it most likely to emerge?
- January 16, 2016The ICS-CERT released a security bulletin that detailed a vulnerability in the technology used to control the systems used by power plants. If exploited, cybercriminals could gain control of such facilities, effectively crippling the national infrastructure.
- August 05, 2015A custom honeypot was used to test the security of US automated gas tank systems. How are attackers abusing the system and which targets did they prefer?
- July 03, 2015As smart devices become more prevalent and are used in critical situations, software developers will have to understand that they now have a greater responsibility to keep their software products safe.