Hidden dangers of biometric authentication devices
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
11 articles
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
The specifics of protecting and updating the OT infrastructure.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
What cyberimmunity means in practice and in the industrial infrastructure environment.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
Effective protection of industrial facilities requires permanent monitoring of both information systems and operational processes. We have just the tool.
Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in targeted attacks, such as BlackEnergy or Operation Ghoul, aimed at the industrial sector, but also in more common cyberthreats that do not target specific victims.