• August 08, 2016
    By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions.
  • August 05, 2016
    This research paper looks at who are continuing to attack external-facing ICS devices and why, and provides attack statistics, in-depth analysis of the threat actors, and their possible motivations.
  • August 05, 2016
    Several noteworthy SCADA attack trends, including an increase in “targeted” attacks, and where they originate from.
  • August 03, 2016
    To compete in today’s market driven global economy, businesses opt for control systems that automatically manage processes. ICS enables efficiency, but are connected, heightening threat exposure and corresponding business risks.
  • July 23, 2016
    Beyond all the doom-laden headlines on a possible "digital Pearl Harbor" scenario, how great is the actual risk and where is it most likely to emerge?
  • July 18, 2016
    This year alone, the FBI predicted that the total loss to ransomware will reach a whopping US$1 billion.
  • June 30, 2016
    Over 689,000 medical records and 9.3 million health insurance records were recently found being sold in the deep web. What happens to the stolen data, and how much is personal information worth in the online black market?
  • June 28, 2016
    This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.
  • June 27, 2016
    Apart from understanding the ransomware tactics and techniques beyond encryption, it is equally important to understand how they arrive in the environment.