Reports
Blog
Events

Filter

19 January 2022

Campaigns abusing corporate trusted infrastructure hunt for corporate credentials on ICS networks

Targets of spyware attacks in which each malware sample has a limited-scope and a short lifetime include industrial enterprises. Victim organizations’ SMTP services are abused to send phishing emails and collect stolen data.

30 December 2021

Log4Shell at industrial enterprises

Although it is still difficult to say to what extent vulnerable ICS systems are exposed to potential attacks, we hope that, unlike IT infrastructures, most vulnerable OT systems cannot accept inputs coming from untrusted sources.

Select a date

Select an author 22
APT 30
Companies and organisations 13
Industrial control systems 4
Industries 29
Laws and regulation 7
Malware 30
Products and services 14
Technologies 28
Types of threats 29

Filter

Select a date

Select an author 6
APT 1
Companies and organisations 51
Events and conferences 2
Industrial control systems 5
Industries 4
Laws and regulation 4
Malware 25
Products and services 58
Technologies 13
Types of threats 25

Filter

Select a date

Companies and organisations 6
Conferences 4
Products and services 1
Technologies 1
Types of events 8

Select a date

Select an author 22
APT 30
Companies and organisations 13
Industrial control systems 4
Industries 29
Laws and regulation 7
Malware 30
Products and services 14
Technologies 28
Types of threats 29
Filter

Select a date

Select an author 6
APT 1
Companies and organisations 51
Events and conferences 2
Industrial control systems 5
Industries 4
Laws and regulation 4
Malware 25
Products and services 58
Technologies 13
Types of threats 25
Filter

Select a date

Companies and organisations 6
Conferences 4
Products and services 1
Technologies 1
Types of events 8
Filter