Enterprise Networks

Evil PLC Attack: Weaponizing PLCs

Programmable logic controllers (PLCs) are indispensable industrial devices that control manufacturing processes in every critical infrastructure sector. Because of their position within automation, threat actors covet access to PLCs; several industrial control system malware strains, from Stuxnet to Incontroller/Pipedream, have targeted PLCs. But what if the PLC wasn’t the prey, and instead was the predator?

Evil PLC Attack: Weaponizing PLCs Read More »

What is Lurking on Your Network

Exposing the threat of shadow devices Most internet communications rely on DNS, although it is often not sufficiently secured, which creates vulnerabilities that can be exploited for data exfiltration and spreading malware. Over 91 percent of malware uses DNS to communicate with C&C servers, lock up data for ransom or exfiltrate data. Existing security controls,

What is Lurking on Your Network Read More »