Join CTA and Dragos as we discuss public ICS/OT exploits for vulnerability prioritization with Jacob Baines, Principal Industrial Control Vulnerability Analyst @Dragos, and Neil Jenkins, Chief Analytic Officer @Cyber Threat Alliance.
Dragos tracks thousands of CVE that affect industrial control systems and operational technology networks. Of these CVE, more than 400 have publicly available exploits. The exploits affect all levels of the Purdue model and significantly lower the barrier of entry to exploit and move around industrial networks. However, not all exploits are created equal. Some are entirely worthless, while others pose significant risks. Understanding where these exploits come from, their impact on industrial network, and which actually matter can significantly aid in vulnerability prioritization.
Author: Cyber Threat Alliance
CTA Webinar – Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table
Adversaries constantly innovate and explore new and more powerful DDoS attack methods, called vectors, creating [...]
CTA Webinar – In The Crosshairs – How Geopolitics Can Increase Your DDOS Risk
Disputes relating to politics, religion, and ideology are often at the root of attack campaigns intended to disrupt the online capabilities of governments, companies, communities [...]
CTA Webinar – The NTT Security Holdings 2022 Global Threat Intelligence Report: A year of more sophisticated and substantial threats
Join CTA and NTT Security Holdings as we discuss the trends and insights from NTT’s 2022 Global Threat Intelligence Report. NTT’s Global Threat Intelligence Centre analysed security data across industries and to distil the key trends from attacks, malware, targeted technologies, and the resulting impact on various industries. NTT continues to [...]