Publications

Reports
Blog
News

Filter

18 September 2019

Security research: CODESYS Runtime, a PLC control framework. Part 3

This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

18 September 2019

Security research: CODESYS Runtime, a PLC control framework. Part 2

This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

18 September 2019

Security research: CODESYS Runtime, a PLC control framework. Part 1

This article continues the discussion of research on popular OEM technologies that are implemented in the products of a large number of vendors. Vulnerabilities in such technologies are highly likely to affect the security of many, if not all, products that use them. In some cases, this means hundreds of products that are used in industrial environments and in critical infrastructure facilities. This is the case with CODESYS Runtime, a framework by CODESYS designed for developing and executing industrial control system software.

Laws and regulation 6
Industries 23
Types of threats 16
Malware 30
APT 29
Products and services 13
Industrial control systems 3
Technologies 22
Companies and organisations 10

Select an author

Select a date

Filter

20 April 2022

Vulnerability in ICS: assessing the severity

On the last day of March 2022, Claroty (Team82) published an article on two vulnerabilities they had identified in Rockwell Automation products. We believe that the severity of these vulnerabilities has been significantly exaggerated. At the same time, the most dangerous vulnerability in the same products has remained unnoticed.

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Select a tag

Laws and regulation 6
Industries 23
Types of threats 16
Malware 30
APT 29
Products and services 13
Industrial control systems 3
Technologies 22
Companies and organisations 10

Select an author

Select a date

Filter

Select a tag

Industrial control systems 2
Types of threats 6
Companies and organisations 5
Laws and regulation 2
Technologies 3
Industries 1

Select an author

Select a date

Filter

Select a tag

Companies and organisations 49
Types of threats 22
Technologies 11
Malware 25
Products and services 58
Industries 3
Events and conferences 2
Industrial control systems 5
APT 1
Laws and regulation 2

Select a date

Filter