Hotspot Observation | Focusing on Power Grid Attack Incidents: Analyzing Vulnerabilities and Security Testing in Industrial Control Systems

Hotspot Observation | Focusing on Power Grid Attack Incidents: Analyzing Vulnerabilities and Security Testing in Industrial Control Systems

As cyber attack methods continue to evolve, industrial control systems, represented by power systems, are gradually shifting from being a “secondary impact area” to a core target in the cyber attack chain. Especially in the context of the ongoing advancement of the industrial internet and the continuous integration of “cloud-edge-end” collaborative systems into key business … Read more

Remember: Defense in Depth

Remember: Defense in Depth

Abstract: Implementing a defense-in-depth cybersecurity strategy against internal and external threats is an effective measure to ensure the security of Industrial Control Systems (ICS). By building a defense-in-depth cybersecurity plan and implementing the 8 recommendations proposed in this article, it will help reduce the cybersecurity risks of Industrial Control Systems (ICS). In the era of … Read more

Research Analysis | Information Security Risk Assessment of Industrial Control Systems in the Context of New Industrialization

Research Analysis | Information Security Risk Assessment of Industrial Control Systems in the Context of New Industrialization

★ Zhongheng Telvi Testing Technology (Beijing) Co., Ltd. Cai Lili Abstract:With the digital transformation and intelligent upgrade of industrial enterprises, as well as the use of new technologies, industrial control systems have become more open, leading to new risk factors. This article introduces the risks faced by industrial control systems in the context of new … Read more

Original Vulnerability | .NET Deserialization Vulnerabilities in Industrial Control Systems

Original Vulnerability | .NET Deserialization Vulnerabilities in Industrial Control Systems

OriginalVulnerability 1. Coding Standards and Software Vulnerabilities Software vulnerabilities are often closely related to the lack of coding standards. If input validation, dependency management, and security design principles are ignored during development, even if the functionality is normal, security risks may be hidden. Taking the Java deserialization vulnerability as an example, the essence is that … Read more

Achieving 2 TOPS/W Efficiency! Unveiling Low Power Design Techniques for Edge AI Chips

Achieving 2 TOPS/W Efficiency! Unveiling Low Power Design Techniques for Edge AI Chips

Reported by Electronic Enthusiasts (Author: Li Wanwan)Low power design for edge AI chips is crucial for their deployment in resource-constrained scenarios such as mobile devices and IoT terminals. In power-sensitive applications like IoT, wearables, and smart homes, low power design directly determines the device’s battery life, deployment costs, and user experience. Why do edge AI … Read more

The Competition Between NB-IoT and LoRa Resumes, This Time the ‘Battlefield’ is in the Sky

The Competition Between NB-IoT and LoRa Resumes, This Time the 'Battlefield' is in the Sky

Author: Zhao Xiaofei Internet of Things Think Tank Original Ten years ago, Low Power Wide Area Network (LPWAN) entered the industry’s view, initiating a competitive landscape. Although various technologies emerged, the 3GPP camp and the LoRa camp ultimately dominated, covering most low-power wide-area connection scenarios. The former includes representative technologies such as NB-IoT and LTE-M, … Read more

A Comprehensive Guide to the ModBus Communication Protocol

A Comprehensive Guide to the ModBus Communication Protocol

Why does industrial automation need a “language”? With the advent of Industry 4.0, various automated factories have emerged, where different machines collaborate to perform high-intensity tasks with minimal errors. So how do these numerous industrial devices “understand” each other’s language? When a conveyor belt transports materials to a loading point, how does the gripper hear … Read more

Why Modbus RTU Always Appears with RS-485?

Why Modbus RTU Always Appears with RS-485?

In the field of industrial communication, Modbus RTU and RS-485 are often mentioned together. Many people mistakenly believe they are the same thing, but in reality, these two concepts are entirely different; they are simply used in close conjunction in industrial control. What is RS-485? RS-485 is a physical layer communication standard that defines how … Read more

JTAG Debugging – GDB Example

JTAG Debugging - GDB Example

OpenOCD is used to drive the JTAG interface, typically in conjunction with GDB for code execution debugging. The usage of GDB is fundamentally no different from its use in other contexts.Some debugging techniques for GDB: Advanced Usage of GDBThere are two ways to start GDB and interact with OpenOCD: GDB communicates with OpenOCD over TCP … Read more

JTAG Debugging – Infineon Aurix Chips

JTAG Debugging - Infineon Aurix Chips

Infineon AURIX TC3xx (or TC2xx) series chips include the corresponding Triboard development board, and the official JTAG hardware box is miniWiggler, which also contains the FTDI USB2JTAG chip:Although it is an FTDI chip, it does not work with the open-source openocd, which is used by the FlysWattery hardware box. The corresponding software provided by Infineon … Read more