Hidden dangers of biometric authentication devices
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
14 articles
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
The specifics of protecting and updating the OT infrastructure.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
What cyberimmunity means in practice and in the industrial infrastructure environment.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
Effective protection of industrial facilities requires permanent monitoring of both information systems and operational processes. We have just the tool.
Its one-year anniversary is the perfect time for a detailed explanation of why our ICS CERT is needed, what it does, and how it differs from others.
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
We conducted a global survey of 359 industrial cybersecurity practitioners to learn more about perceptions and realities.
As we keep saying, it’s very important to be aware of the latest cybersecurity news and threats. Being prepared is more than half the battle. However, even those who know