Publications

Reports
Blog
Events

Filter

30 December 2021

Log4Shell at industrial enterprises

Although it is still difficult to say to what extent vulnerable ICS systems are exposed to potential attacks, we hope that, unlike IT infrastructures, most vulnerable OT systems cannot accept inputs coming from untrusted sources.

Select a date

Select an author 13
Industries 29
Types of threats 29
Industrial control systems 3
Technologies 28
Companies and organisations 13
Products and services 14
APT 29
Laws and regulation 6
Malware 30

Filter

Select a date

Select an author 5
Industrial control systems 5
Technologies 13
Malware 25
Companies and organisations 51
Types of threats 25
Laws and regulation 3
Industries 4
Products and services 58
Events and conferences 2
APT 1

Filter

Select a date

Companies and organisations 6
Types of events 8
Technologies 1
Conferences 4
Products and services 1

Select a date

Select an author 13
Industries 29
Types of threats 29
Industrial control systems 3
Technologies 28
Companies and organisations 13
Products and services 14
APT 29
Laws and regulation 6
Malware 30
Filter

Select a date

Select an author 5
Industrial control systems 5
Technologies 13
Malware 25
Companies and organisations 51
Types of threats 25
Laws and regulation 3
Industries 4
Products and services 58
Events and conferences 2
APT 1
Filter

Select a date

Companies and organisations 6
Types of events 8
Technologies 1
Conferences 4
Products and services 1
Filter