Data-driven analysis of vulnerabilities in real-world OT networks
Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and environmental safety, according to CyberX. Many are exposed to the public internet and easy to traverse using simple vulnerabilities like plain-text passwords. Lack of even basic protections can enable attackers to quietly perform reconnaissance before sabotaging physical processes. As a result, once attackers get into an OT network — either via … More → Continue reading Data-driven analysis of vulnerabilities in real-world OT networks