Claroty researchers found 6 critical in a third-party software component vulnerabilities that could be exploited to take over industrial control systems. To exploit the flaws, an attacker would first have to phish or socially-engineer victims to lure them to a site they control.
Claroty researchers found 6 critical #vulnerabilities that could be exploited to take over industrial control systems – more details from @LindseyOD123 in @threatpost: https://t.co/Y1tiEIGiVG
— Claroty (@Claroty) September 9, 2020
Experts Comments
Dot Your Expert Comments
Only for registered and approved experts. Please register before providing comments. Register here
Linkedin Message
@Israel Barak, Chief Information Security Officer , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ransomware is an especially prevalent attack vector for ICS companies...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/critical-flaws-in-3rd-party-code-allow-takeover-of-industrial-control-systems
Facebook Message
@Israel Barak, Chief Information Security Officer , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ransomware is an especially prevalent attack vector for ICS companies...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/critical-flaws-in-3rd-party-code-allow-takeover-of-industrial-control-systems