Explore >> Select a destination


You are here

pylos.co
| | www.dragos.com
7.3 parsecs away

Travel
| | ICS environments require reliable, available, and sound processes to ensure continued, safe production. Ransomware - malware that encrypts vital data and disrupts operations - directly impacts these goals, yet historically ICS networks were free of such software. The only example of "ICS targeting ransomware" is a proof-of-concept (or hoax, depending on perspective) from April 2017, never observed "in-the-wild." Yet since that time, ICS asset owners and operators faced several waves of ransomware (or dis...
| | blog.sicuranext.com
8.4 parsecs away

Travel
| | A new cyber-criminal group known as Hunt3r Kill3rs has recently emerged, claiming responsibility for a series of attacks on critical infrastructure with the final political goal of attacking Israeli companies and Israeli allies. This group has primarily focused on industrial control systems (ICS), communication networks, and vulnerable web applications. Their
| | khargharnews.com
3.0 parsecs away

Travel
| | A hacktivist group has made bold claims regarding an attack on an industrial control system (ICS) device, but industry professionals have questioned their
| | www.elttam.com
74.2 parsecs away

Travel
| elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments.