Yes We SCAN!

Early detection of ICS attacks decreases the probability of causing damage to the network. In this post I will focus on one of the first stages in ICS attacks, where the attacker attempts to scan the network for devices. First, I will explain the motivation behind the...

The weakness of ICS maintenance operations

What would you say is your biggest concern when it comes to cyber threats to your ICS system? When I asked several cyber-officers in big utilities, they told me that their biggest concern was the interaction between people and the ICS network. This is how it usually...