Cyber Threats To The SECS/GEM Protocol In Smart Manufacturing


Semiconductors are an indispensable part of modern electronic products and are also a fundamental basis for the development of the AI industry. This industry is crucial for global economic growth and national security. As the semiconductor industry transitions to Industry 4.0, the connection between production equipment and factory networks has expanded the attack surface, providing adversaries... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Enhancing HMI Security: How To Protect ICS Environments From Cyber Threats


HMIs (Human Machine Interfaces) can be broadly defined as just about anything that allows humans to interface with their machines, and so are found throughout the technical world. In OT environments, operators use various HMIs to interact with industrial control systems in order to direct and monitor the operational systems. And wherever humans and machines intersect, security problems can ensu... » read more

Cybersecurity Metrics: The Path To OT Security Maturity


In 2023, the cybersecurity challenges in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape reached unprecedented levels. Ransomware, increasingly prevalent through new Ransomware-as-a-Service (RaaS) models, became a widespread and costly headache. While some might argue this exaggerates the risk, the growing demand for defenses is not overstated. 2024 continues to b... » read more