ICS Malware Data Feed
Stream of data (IOCs, hashes, IDS rules, Yara rules) on threats identified by ICS CERT experts in ICS systems, designed to simplify and automate attack detection and investigation
Threat Hunting and APT Investigation
Joint investigation of APTs and other cyberattacks targeting an industrial organization, exchanging indicators of compromise with other organizations and independent researchers