Fuzzing analysis conducted by Synopsys shows that Industrial Control Systems and IoT industries are most at risk of zero days cyber attacks. The data comes from fuzz testing, an automated process that systematically sends data to devices and systems with the goal of causing errors in a targeted network protocol. Andrea Carcano, Co-Founder and Chief Product Officer at Nozomi Networks commented below.
Andrea Carcano, Co-Founder and Chief Product Officer at Nozomi Networks:
“Fuzzing is not new. It’s a simple technique to identify issues and vulnerabilities that can be applied and also to industrial control systems. These types of vulnerabilities are usually simple, but can create significant damage especially if the target is an industrial control system. Because industrial devices are proliferating as part of the move to modernize many industries, and because those devices may now be directly or indirectly exposed to the internet, this basic technique could be used by attackers. While industrial device manufactures are making improvements to the security of their equipment, it is a huge challenge. Fortunately, technologies are readily available to monitor and identify specific attacks that are using vulnerabilities discovered with fuzzing that could cause malfunctions to industrial components.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.