• August 08, 2016
    By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions.
  • August 05, 2016
    This research paper looks at who are continuing to attack external-facing ICS devices and why, and provides attack statistics, in-depth analysis of the threat actors, and their possible motivations.
  • August 05, 2016
    Several noteworthy SCADA attack trends, including an increase in ¡°targeted¡± attacks, and where they originate from.
  • August 03, 2016
    To compete in today¡¯s market driven global economy, businesses opt for control systems that automatically manage processes. ICS enables efficiency, but are connected, heightening threat exposure and corresponding business risks.
  • July 23, 2016
    Beyond all the doom-laden headlines on a possible "digital Pearl Harbor" scenario, how great is the actual risk and where is it most likely to emerge?
  • June 28, 2016
    This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.
  • January 16, 2016
    The ICS-CERT released a security bulletin that detailed a vulnerability in the technology used to control the systems used by power plants. If exploited, cybercriminals could gain control of such facilities, effectively crippling the national infrastructure.
  • August 05, 2015
    A custom honeypot was used to test the security of US automated gas tank systems. How are attackers abusing the system and which targets did they prefer?
  • July 03, 2015
    As smart devices become more prevalent and are used in critical situations, software developers will have to understand that they now have a greater responsibility to keep their software products safe.