30 October 2025
        
        “Security researchers are the main factor motivating automakers to invest in protecting their products”    
            Industrial system vulnerability research experts discuss threats associated with over-the-air data transmission technologies, attack vectors targeting electric vehicles specifically, the evolution of transportation systems from a cybersecurity perspective, and the role of artificial intelligence in ensuring cybersecurity.
                
    
    15 April 2025
        
        “Security by design helps you stay one step ahead”    
            Kaspersky expert discusses the challenges of assessing the security of industrial facilities and the role of the professional community in their protection, the reasons behind security issues in rapidly evolving industries, and the impact of digitalization on society.
                
    
    30 May 2023
        
        Why APTs are so successful – stories from IR trenches    
            During IR, while trying to figure out what went wrong, we’ve found numerous issues
                
    
    12 December 2022
        
        Unusual penetration techniques – in the wild and in Red Team research    
            I would like to talk about some of the tricks and methods I have seen used to gain that all important initial access to remote systems. Specifically, the unexpected and unusual.
                
    
    24 May 2022
        
        Draft of the NIST Guide #800-82 – what has changed    
            The release of the third version of the Guide to Operational Technology (OT) Security, SP 800-82 Rev. 3, is, without a doubt, a milestone. Is the third version as good as the previous ones? What has changed?
                
    
    20 April 2022
        
        Vulnerability in ICS: assessing the severity    
            On the last day of March 2022, Claroty (Team82) published an article on two vulnerabilities they had identified in Rockwell Automation products. We believe that the severity of these vulnerabilities has been significantly exaggerated. At the same time, the most dangerous vulnerability in the same products has remained unnoticed.
                
    
    31 March 2022
        
        Vulnerabilities in Tekon-Automatics solution: (ir)responsible disclosure and scope of the problem    
            Researcher Jose Bertin described the exploitation of several vulnerabilities in a Tekon-Automatics automation solution. We analyze the real scope of what has happened and offer our take on whether this can be considered ethical vulnerability disclosure.
                
    
    28 March 2022
        
        Kaspersky’s statement on the FIRST membership suspension    
            Kaspersky ICS CERT received a letter from FIRST, notifying that its membership has been temporarily suspended. Kaspersky is disappointed by this decision and believes that it hurts the international community of experts and the cybersecurity industry as a whole.
                
    
    31 March 2021
        
        Good old buffer overflow    
            CISA has issued an advisory on a Rockwell Automation MicroLogix 1400 buffer overflow vulnerability
                
    
    30 March 2021
        
        Network Asset Traversal or NATural disaster: NAT Slipstreaming 2.0    
            NAT bypassing techniques recently published by researchers are particularly dangerous for OT networks of industrial enterprises