|”Industrial control networks are notoriously soft targets — they’re rife with vulnerabilities such as outdated Windows systems, unpatched firmware in controllers, flat topologies, unauthorized internet connections, and lack of monitoring. As a result, we expect nation-state attacks on industrial and critical infrastructure networks to continue — as we’ve seen in the past with Black Energy, Industroyer, TRITON, and NotPetya — from the usual suspects including Russia, Iran, North Korea, and China. An interesting twist is that we expect to see an uptick in cybercriminal organizations getting in the act for financial gain. You can easily imagine cybercriminals installing back-doors in…
Information Security Buzz is an independent resource that provides the experts’ comments, analysis, and opinion on the latest Cybersecurity news and topics