ICS Threat Intelligence Malware Data Feed
Stream of data (IOCs, hashes, Yara rules) on threats identified by ICS CERT experts in ICS systems, designed to simplify and automate attack detection and investigation
Artifact Analysis and IoC Sharing
Analyzing artifacts of cyberattacks on industrial enterprises and sharing indicators of compromise with other organizations and independent researchers
Threat Hunting and APT Investigation
Joint investigation of APTs and other cyberattacks targeting an industrial organization