What kind of malware is hitting industrial control systems, and how worried should we and the operators of theses systems actually be? IT security teams unused to ICS environments are helping potential attackers by not recognizing legitimate ICS software and flagging it as malicious. This software thus unintentionally ends in public databases, where adversaries might […]
Latest Comments