Publications

Reports
News

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Kirill Kruglov

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

30 December 2021

Log4Shell at industrial enterprises

Although it is still difficult to say to what extent vulnerable ICS systems are exposed to potential attacks, we hope that, unlike IT infrastructures, most vulnerable OT systems cannot accept inputs coming from untrusted sources.

APT 5
Companies and organisations 9
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 17
Products and services 11
Technologies 13
Types of threats 9

Select an author

Select a date

Filter

APT 1
Companies and organisations 45
Events and conferences 1
Industrial control systems 5
Industries 4
Laws and regulation 2
Malware 25
Products and services 56
Technologies 12
Types of threats 23

Select an author

Select a date

Select a tag

APT 5
Companies and organisations 9
Industrial control systems 3
Industries 17
Laws and regulation 3
Malware 17
Products and services 11
Technologies 13
Types of threats 9

Select an author

Select a date

Filter

Select a tag

APT 1
Companies and organisations 45
Events and conferences 1
Industrial control systems 5
Industries 4
Laws and regulation 2
Malware 25
Products and services 56
Technologies 12
Types of threats 23

Select an author

Select a date

Filter