Publications

Reports
Blog
News

Filter

18 September 2019

Security research: CODESYS Runtime, a PLC control framework. Part 3

This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

18 September 2019

Security research: CODESYS Runtime, a PLC control framework. Part 2

This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

18 September 2019

Security research: CODESYS Runtime, a PLC control framework. Part 1

This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

APT 19
Companies and organisations 10
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 18
Products and services 12
Technologies 19
Types of threats 10

Select an author

Select a date

Filter

20 April 2022

Vulnerability in ICS: assessing the severity

On the last day of March 2022, Claroty (Team82) published an article on two vulnerabilities they had identified in Rockwell Automation products. We believe that the severity of these vulnerabilities has been significantly exaggerated. At the same time, the most dangerous vulnerability in the same products has remained unnoticed.

Companies and organisations 5
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 6

Select an author

Select a date

Filter

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Select a tag

APT 19
Companies and organisations 10
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 18
Products and services 12
Technologies 19
Types of threats 10

Select an author

Select a date

Filter

Select a tag

Companies and organisations 5
Industrial control systems 2
Industries 1
Laws and regulation 2
Technologies 3
Types of threats 6

Select an author

Select a date

Filter

Select a tag

APT 1
Companies and organisations 49
Events and conferences 2
Industrial control systems 5
Industries 3
Laws and regulation 2
Malware 25
Products and services 58
Technologies 11
Types of threats 22

Select a date

Filter