Reports
Blog
Events

Filter

19 October 2020

Practical example of fuzzing OPC UA applications

We continue to describe our approaches to searching for vulnerabilities in industrial systems based on the OPC UA protocol. In this article, we examine new techniques that can be used to search for memory corruption vulnerabilities if the source code is available. We also discuss an example of fuzzing using libfuzzer.

15 September 2020

The State of Industrial Cybersecurity 2020

In 2020 ARC Advisory Group on behalf of Kaspersky conducted a survey on the state of industrial cybersecurity, as well as the current priorities and challenges of industrial organizations. More than 330 industrial companies and organizations across the globe were surveyed online and 10 industry representatives were interviewed at trade fairs and ARC forums worldwide.

Industries 27
Types of threats 26
Industrial control systems 3
Technologies 26
Companies and organisations 12
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Select an author

Select a date

Filter

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Companies and organisations 6
Types of events 8
Technologies 1
Conferences 4
Products and services 1

Select a date

Select a tag

Industries 27
Types of threats 26
Industrial control systems 3
Technologies 26
Companies and organisations 12
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Select an author

Select a date

Filter

Select a tag

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Select a tag

Companies and organisations 6
Types of events 8
Technologies 1
Conferences 4
Products and services 1

Select a date

Filter