Publications
Services
Advisories
Events
Statistics
English
English
Русский
Publications
Services
Advisories
Events
Statistics
English
English
Русский
Publications
Reports
Blog
News
Subscribe to newsletter
Filter
Subscribe to newsletter
Types of threats
26
malware
spyware
phishing
ransomware
personal data leakage
data leakage
denial of IT services
denial of operations
denial of shipment
denial of production
denial of service
vulnerabilities
0-day
living-off-the-land
adversary-in-the-middle
APT
supply chain
abuse of IT services
data loss
hacktivists
DLL hijacking
Stolen data exfiltration
cyberespionage
business email compromise
COVID-19
KRACK
Industries
26
ICS engineering
ICS integration
buildings automation
energy sector
metallurgy
mining
electronics industry
construction
food & beverage
logistics
automotive
manufacturing
pharmaceutical
transportation
utilities
water supply
oil & gas
shipbuilding
aerospace
military-defense
industrial automation
irrigation
robotics
waste recycling
government
healthcare
Industrial control systems
3
statistics
industrial cybersecurity
ICS security
Technologies
26
miners
network equipment
UMTS
HSPA
Java
unitronics
cloud services
Air-gapped networks
USB removable media
dataleak
digital twins
UMAS
IoT
fuzzing
firmware
SMTP
VPN
RDP
RAT
OPC UA
steganography
VNC
cameras
802.11
Wi-Fi
WPA2
Companies and organisations
12
Telit
CISA
Schneider Electric
Rockwell Automation
Colonial Pipeline
OPC Foundation
Siemens
IIC
Fibaro
Moxa
Gemalto
General Electric
Products and services
14
Centurion
MOVEit MFT
ISaGRAF
Log4j
FortiGate
RMS
TeamViewer
SPPA-T3000
Codesys
Codesys Runtime
Fibaro Home Center
ThingsPro Suite
SafeNet
Machine Learning for Anomaly Detection
APT
29
Cloud Atlas/Inception
Volt Typhoon
Sofacy
Lazarus
Earth Longzhi
APT43
Andariel
APT41
Lancefly
YoroTrooper
APT29
Mint Sandstorm
Tortoiseshell
APT31
EV-0530
Tropic Trooper
UNC4034/ZINC
UNC3890
POLONIUM
TA423/Red Ladon
Budworm
IRIDIUM/Sandworm
Woody Rat
Worok
TA428
Zebrocy
GreyEnergy
Energetic Bear
Crouching Yeti
Laws and regulation
6
UN R 155
ISO/SAE 21434
automotive cybersecurity
legislation
biometric data
critical infrastructure
Malware
30
MATA
CommonMagic
RomCom
Vice Society
Royal
RA
Snake
Kryptik
PlugX
CloudWizard
FourteenHi
MeatBall
ShadowPad
Log4Shell
Manuscrypt
PseudoManuscrypt
DarkSide
Cring
ThreatNeedle
SunBurst
MontysThree
RobinHood
LockerGoga
REvil
GandCrab
WannaCry
Ryuk
Milum
Expetr
CrashOverride/Industroyer
Select an author
All authors
Sergey Anufrienko
Pavel Cheremushkin
Yuliya Dashchenko
Vladimir Dashchenko
Evgeny Goncharov
Vyacheslav Kopeytsev
Kirill Kruglov
Andrey Lavrentyev
Pavel Nesterov
Alexander Nikolaev
Alexander Nochvay
Anastasiya Oblogina
Ekaterina Rudina
Select a date
Back to top
Filter
Industrial control systems
2
industrial cybersecurity
ICS security
Types of threats
6
APT
vulnerabilities
initial access
TTP
buffer overflow
MitM
Companies and organisations
5
Red Team
NIST
Rockwell Automation
Siemens
Schneider Electric
Laws and regulation
2
legislation
critical infrastructure
Technologies
3
PLC
NAT
industrial networks
Industries
1
smart cities
Select an author
All authors
Vladimir Dashchenko
Evgeny Goncharov
Vyacheslav Kopeytsev
Ekaterina Rudina
Marcel Strecker
Select a date
Back to top
Filter
Companies and organisations
49
FIRST
Claroty
Schneider Electric
Siemens
Emerson
Elexon
BlueScope
Stadler
DESMI
Energias de Portugal
Advantech
Picanol Group
NCA
Bapco
US Coast Guard
WAGO
Rheinmetall Group
Red Lion Controls
EZAutomation
IIC
Mitsubishi Electric
Phoenix Contact
ASCO Industries
Norsk Hydro
Zelio Soft
ENISA
Circontrol
AVEVA
Entes
Fuji Electric
Opto22
Princeton University
Symantec
Dragos
Wecon
Moxa
ABB
Allen-Bradley
Rockwell Automation
Yokogawa
Martem
OPC Foundation
Beckhoff
Intel
General Electric
Palo Alto Networks
US-CERT
MITRE
Abbott
Types of threats
22
vulnerabilities
denial of service
ransomware
path traversal
argument injection
SQL injection
remote code execution
privilege escalation
XXE
phishing
COVID-19
FragmentSmack
SegmentSmack
improper privilege management
buffer overflow
APT
botnets
Spectre
Meltdown
IoT botnet
KRACK
BlueBorne
Technologies
11
Open Platform Communications
TCP/IP
IoT
HMI
RAT
PLC
industrial managed switches
USB removable media
satellite communications
cryptominers
Bluetooth
Malware
25
Ryuk
PoetRAT
REvil
Sodinokibi
Maze
Ragnar Locker
TrickBot
ZeroCleare
Dustman
Shamoon
Emotet
Yoroi
MartyMcFly
Leafminer
RASPITE
Thrip
VPNFilter
OMG
Mirai
TRITON
Satori
Reaper
Expetr
Bad Rabbit
Dragonfly
Products and services
58
ABB 800xA
WebAccess/NMS
Modicon
SPPA-T3000
SiNVR 3
XHQ Operations Intelligence
Cisco IOS
Crimson
EZ PLC Editor
EZ Touch Editor
FR Configurator2
SIMATIC
PCS7
TIA Administrator
WinCC
Interactive Graphical SCADA System
Floating License Manager
ABB Panel Builder 600
SICK MSC800
Advantech WebAccess
PC Worx
Automation Worx Software Suite
Cisco Industrial Network Director
Optergy Proton/Enterprise
SIMATIC PCS 7
SIMATIC WinCC
IIoT Monitor
GP-Pro EX
SINUMERIK
SESU
CirCarLife
Wecon PI Studio
Alpha5
FRENIC
AMS Device Manager
TD Keypad Designer
SCALANCE
PAC Control Basic
PAC Control Professional
PowerLogic
DeltaV
LeviStudioU
NPort
Panel Builder
e!DISPLAY
SIPROTEC
Stratix
Delta Industrial Automation
U.motion Builder
Cisco Talos
TELEM-GW6/GWM
PACSystems
FL SWITCH
TIM 1531 IRC
TwinCAT
Codesys
Nari PCS-9611
Dnsmasq
Industries
3
water supply
healthcare and medical
energy sector
Events and conferences
2
Kaspersky Industrial Cybersecurity Conference 2019
IT Security for Industrial Systems
Industrial control systems
5
smart manufacturing
Industry 4.0
industrial cybersecurity
IoT Security Maturity Model
ICS security
APT
1
GreyEnergy
Laws and regulation
2
cyber weapon
critical infrastructure
Select a date
Back to top
Select a tag
Types of threats
26
malware
spyware
phishing
ransomware
personal data leakage
data leakage
denial of IT services
denial of operations
denial of shipment
denial of production
denial of service
vulnerabilities
0-day
living-off-the-land
adversary-in-the-middle
APT
supply chain
abuse of IT services
data loss
hacktivists
DLL hijacking
Stolen data exfiltration
cyberespionage
business email compromise
COVID-19
KRACK
Industries
26
ICS engineering
ICS integration
buildings automation
energy sector
metallurgy
mining
electronics industry
construction
food & beverage
logistics
automotive
manufacturing
pharmaceutical
transportation
utilities
water supply
oil & gas
shipbuilding
aerospace
military-defense
industrial automation
irrigation
robotics
waste recycling
government
healthcare
Industrial control systems
3
statistics
industrial cybersecurity
ICS security
Technologies
26
miners
network equipment
UMTS
HSPA
Java
unitronics
cloud services
Air-gapped networks
USB removable media
dataleak
digital twins
UMAS
IoT
fuzzing
firmware
SMTP
VPN
RDP
RAT
OPC UA
steganography
VNC
cameras
802.11
Wi-Fi
WPA2
Companies and organisations
12
Telit
CISA
Schneider Electric
Rockwell Automation
Colonial Pipeline
OPC Foundation
Siemens
IIC
Fibaro
Moxa
Gemalto
General Electric
Products and services
14
Centurion
MOVEit MFT
ISaGRAF
Log4j
FortiGate
RMS
TeamViewer
SPPA-T3000
Codesys
Codesys Runtime
Fibaro Home Center
ThingsPro Suite
SafeNet
Machine Learning for Anomaly Detection
APT
29
Cloud Atlas/Inception
Volt Typhoon
Sofacy
Lazarus
Earth Longzhi
APT43
Andariel
APT41
Lancefly
YoroTrooper
APT29
Mint Sandstorm
Tortoiseshell
APT31
EV-0530
Tropic Trooper
UNC4034/ZINC
UNC3890
POLONIUM
TA423/Red Ladon
Budworm
IRIDIUM/Sandworm
Woody Rat
Worok
TA428
Zebrocy
GreyEnergy
Energetic Bear
Crouching Yeti
Laws and regulation
6
UN R 155
ISO/SAE 21434
automotive cybersecurity
legislation
biometric data
critical infrastructure
Malware
30
MATA
CommonMagic
RomCom
Vice Society
Royal
RA
Snake
Kryptik
PlugX
CloudWizard
FourteenHi
MeatBall
ShadowPad
Log4Shell
Manuscrypt
PseudoManuscrypt
DarkSide
Cring
ThreatNeedle
SunBurst
MontysThree
RobinHood
LockerGoga
REvil
GandCrab
WannaCry
Ryuk
Milum
Expetr
CrashOverride/Industroyer
Select an author
All authors
Sergey Anufrienko
Pavel Cheremushkin
Yuliya Dashchenko
Vladimir Dashchenko
Evgeny Goncharov
Vyacheslav Kopeytsev
Kirill Kruglov
Andrey Lavrentyev
Pavel Nesterov
Alexander Nikolaev
Alexander Nochvay
Anastasiya Oblogina
Ekaterina Rudina
Select a date
Apply
Filter
close
Select a tag
Industrial control systems
2
industrial cybersecurity
ICS security
Types of threats
6
APT
vulnerabilities
initial access
TTP
buffer overflow
MitM
Companies and organisations
5
Red Team
NIST
Rockwell Automation
Siemens
Schneider Electric
Laws and regulation
2
legislation
critical infrastructure
Technologies
3
PLC
NAT
industrial networks
Industries
1
smart cities
Select an author
All authors
Vladimir Dashchenko
Evgeny Goncharov
Vyacheslav Kopeytsev
Ekaterina Rudina
Marcel Strecker
Select a date
Apply
Filter
close
Select a tag
Companies and organisations
49
FIRST
Claroty
Schneider Electric
Siemens
Emerson
Elexon
BlueScope
Stadler
DESMI
Energias de Portugal
Advantech
Picanol Group
NCA
Bapco
US Coast Guard
WAGO
Rheinmetall Group
Red Lion Controls
EZAutomation
IIC
Mitsubishi Electric
Phoenix Contact
ASCO Industries
Norsk Hydro
Zelio Soft
ENISA
Circontrol
AVEVA
Entes
Fuji Electric
Opto22
Princeton University
Symantec
Dragos
Wecon
Moxa
ABB
Allen-Bradley
Rockwell Automation
Yokogawa
Martem
OPC Foundation
Beckhoff
Intel
General Electric
Palo Alto Networks
US-CERT
MITRE
Abbott
Types of threats
22
vulnerabilities
denial of service
ransomware
path traversal
argument injection
SQL injection
remote code execution
privilege escalation
XXE
phishing
COVID-19
FragmentSmack
SegmentSmack
improper privilege management
buffer overflow
APT
botnets
Spectre
Meltdown
IoT botnet
KRACK
BlueBorne
Technologies
11
Open Platform Communications
TCP/IP
IoT
HMI
RAT
PLC
industrial managed switches
USB removable media
satellite communications
cryptominers
Bluetooth
Malware
25
Ryuk
PoetRAT
REvil
Sodinokibi
Maze
Ragnar Locker
TrickBot
ZeroCleare
Dustman
Shamoon
Emotet
Yoroi
MartyMcFly
Leafminer
RASPITE
Thrip
VPNFilter
OMG
Mirai
TRITON
Satori
Reaper
Expetr
Bad Rabbit
Dragonfly
Products and services
58
ABB 800xA
WebAccess/NMS
Modicon
SPPA-T3000
SiNVR 3
XHQ Operations Intelligence
Cisco IOS
Crimson
EZ PLC Editor
EZ Touch Editor
FR Configurator2
SIMATIC
PCS7
TIA Administrator
WinCC
Interactive Graphical SCADA System
Floating License Manager
ABB Panel Builder 600
SICK MSC800
Advantech WebAccess
PC Worx
Automation Worx Software Suite
Cisco Industrial Network Director
Optergy Proton/Enterprise
SIMATIC PCS 7
SIMATIC WinCC
IIoT Monitor
GP-Pro EX
SINUMERIK
SESU
CirCarLife
Wecon PI Studio
Alpha5
FRENIC
AMS Device Manager
TD Keypad Designer
SCALANCE
PAC Control Basic
PAC Control Professional
PowerLogic
DeltaV
LeviStudioU
NPort
Panel Builder
e!DISPLAY
SIPROTEC
Stratix
Delta Industrial Automation
U.motion Builder
Cisco Talos
TELEM-GW6/GWM
PACSystems
FL SWITCH
TIM 1531 IRC
TwinCAT
Codesys
Nari PCS-9611
Dnsmasq
Industries
3
water supply
healthcare and medical
energy sector
Events and conferences
2
Kaspersky Industrial Cybersecurity Conference 2019
IT Security for Industrial Systems
Industrial control systems
5
smart manufacturing
Industry 4.0
industrial cybersecurity
IoT Security Maturity Model
ICS security
APT
1
GreyEnergy
Laws and regulation
2
cyber weapon
critical infrastructure
Select a date
Apply
Filter
close
Newsletter subscription
E-mail
Your company or organization name
Vulnerability data
Threat Information
I agree to provide my contact information to Kaspersky Lab (first name, last name, email address, phone, country postal code) to be contacted by Kaspersky Lab sales representatives by phone for a personalized offer that could be based, in particular, on geography and company size information provided; to receive information via email about Kaspersky Lab products and services including promotional offers, product updates and premium assets like white papers, webcasts, videos, events etc.; to participate in surveys to vocalize opinion on various aspects of Kaspersky Lab business, in particular, about products, and technical support. I understand that I can withdraw this consent at any time via unsubscribe link from email or via
Privacy Policy
Subscribe