05 February 2026
RecommendationsBaseline security controls and practices that help defend against diverse cyberthreats across multiple stages of an attack, and controls crucial for protecting against particular types of cyberthreats.
Filter
05 February 2026
RecommendationsBaseline security controls and practices that help defend against diverse cyberthreats across multiple stages of an attack, and controls crucial for protecting against particular types of cyberthreats.
10 August 2023
Common TTPs of attacks against industrial organizations. Implants for uploading dataIn this part we present information on the four types of implants and two tools used during the last (third) stage of the attacks discovered.
31 July 2023
Common TTPs of attacks against industrial organizations. Implants for gathering dataThis part of the research is devoted to second stage malware used to gather data on infected systems of industrial organizations.
20 July 2023
Common TTPs of attacks against industrial organizations. Implants for remote accessIn this article (which is the first part of the report) we analyze common TTPs of implants used by threat actors to establish a persistent remote access channel into the infrastructure of industrial organizations.
Filter
Filter