Schweitzer Engineering Labs has published an excellent paper on the Aurora vulnerability, which was originally discovered by DHS/INL in 2007. (Hint for IT folks: This vulnerability is completely unrelated to the attack against Google.) The paper is a must-read for anyone wanting to understand real-world vulnerabilities in automation and control.
Suche
Letzte Artikel
- The five things you need to know about OT/ICS vulnerability and patch management
- Why OT asset discovery and network anomaly detection are two different things
- The three OT security / OT asset management market categories in 2019
- Why Ethernet/IP changes the OT asset discovery game
- Why you need an OT/ICS software inventory, and how to build one
Archiv
- February 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- June 2018
- March 2018
- September 2017
- August 2017
- March 2017
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- January 2015
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010