What Does Hacking Historical Databases in Industrial Control Systems Mean?

What Does Hacking Historical Databases in Industrial Control Systems Mean?

Researchers from the industrial cybersecurity company Claroty revealed on January 17 that their Team82 discovered five exploitable vulnerabilities (CVE-2022-46732, CVE-2022-46660, CVE-2022-43494, CVE-2022-46331, and CVE-2022-38469) in GE Digital’s Proficy Historian server, affecting multiple critical infrastructure sectors. Threat actors could exploit these vulnerabilities to access historical data, crash devices, or execute code remotely. These vulnerabilities impact GE … Read more

Top Ten Security Issues Facing Industrial Control Systems

Top Ten Security Issues Facing Industrial Control Systems

Author | Green Alliance Technology With the continuous advancement of strategies such as Germany’s Industry 4.0, America’s Industrial Internet, and China’s Manufacturing 2025, along with the integrated development of new generation information technologies like the Internet of Things, cloud computing, big data, and 5G, industrial production networks are gradually interconnected with office networks, the Internet, … Read more

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

1. Overview of Cybersecurity 1.1 Definition Information Security: The technical and managerial security measures established and adopted for data processing systems, protecting computer hardware, software, and data from accidental and malicious destruction, alteration, and disclosure. Cybersecurity: Prevent unauthorized users from accessing information Prevent unauthorized attempts to destroy or modify information 1.2 Characteristics of Information Security … Read more

God Mode of IoT Devices: Insights from 2017 Security Developer Summit

God Mode of IoT Devices: Insights from 2017 Security Developer Summit

Editor’s Note: Currently, the security issues of IoT devices are mainly limited by hardware and software. Often, if the configuration does not keep up, even if developers want to address security issues, they may feel powerless. On the software level, the built-in protection mechanisms of the system are particularly critical, especially permission-based protections. We know … Read more

Bluetooth Security Analysis in IoT Scenarios

Bluetooth Security Analysis in IoT Scenarios

1 Introduction Bluetooth technology has been widely applied in various scenarios such as personal electronics, automotive electronics, smart homes, smart cities, and industrial IoT, gaining support from over 30,000 manufacturers. The number of Bluetooth-enabled devices has reached 3.6 billion, and it is expected to rise to 5.2 billion by 2020. Bluetooth is currently one of … Read more

Free Course on Assembly Language and Binary Vulnerabilities

Free Course on Assembly Language and Binary Vulnerabilities

I don’t know when learning programming became a headache. There are always those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and become the dream of countless girls. But reality always hits hard…. There are many moments when I feel the urge to smash my … Read more

Research on PLC Attack Paths in Industrial Control Systems Security

Research on PLC Attack Paths in Industrial Control Systems Security

Abstract PLC (Programmable Logic Controller) is a fundamental control device in critical infrastructure, and its security is crucial for the stable operation of the entire control system. However, with the deepening integration of information technology and industrialization, as well as the advancement of Industry 4.0, the information security issues of industrial control systems have become … Read more

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Author | Zhang Jiaqiu Liu Zhongjin 1 Introduction to BusyBox Components BusyBox is a commonly used component in embedded Linux, known as the “Swiss Army Knife of Embedded Linux.” It integrates commonly used UNIX commands into a single executable file. By streamlining functionality and sharing code, BusyBox retains the most commonly used features while significantly … Read more

The Past, Present, and Future of Embedded System Cybersecurity

The Past, Present, and Future of Embedded System Cybersecurity

Author: Tiandi Hexing Industrial Cybersecurity Research Institute Editor’s Note: With the development of ubiquitous connectivity, automation, digitalization, and intelligence, embedded systems play a more important role than ever in realizing new functions of software-driven devices, but new cybersecurity threats have emerged. The threats faced by embedded systems are constantly evolving, which is worth considering. Although … Read more