First ATT&CK Knowledge Base for Industrial Control Systems (ICS)

First ATT&CK Knowledge Base for Industrial Control Systems (ICS)

On January 7, MITRE released the ATT&CK for ICS knowledge base, which mainly introduces the strategies and techniques used by cyber attackers when targeting industrial control systems (ICS), providing a reference for critical infrastructure and other organizations using industrial control systems to assess network risks. Why ICS? First, what is an industrial control system? It … Read more

How to Reduce Threats to Industrial Control System Networks

How to Reduce Threats to Industrial Control System Networks

Abstract Due to aging infrastructure, lack of security planning and design, and insufficient focus on protecting Industrial Control System (ICS) assets, the threats facing ICS networks remain high. The threats facing the infrastructure of Industrial Control System (ICS) networks are continuously increasing, and their complexity is greater than ever before. The increase in both the … Read more

Cybersecurity Issues of Sensors in Industrial Systems

Cybersecurity Issues of Sensors in Industrial Systems

Author | Antai Technology 【Abstract】Methods used in industry to protect instruments from unauthorized modifications include hardware write protection switches on instruments, software write protection passwords on instruments, passwords for remotely managing instruments’ IMS/AMS, and various unique protections provided by SIS solutions. Utilizing these protective measures, Project 12, aided by the U.S. Department of Homeland Security, … Read more

5 Major Challenges in Implementing Industrial IoT

5 Major Challenges in Implementing Industrial IoT

Translator | Julian Chen Reviewer | Sun Shujuan This article will explain the basic concepts of Industrial IoT while discussing the 5 major challenges associated with it. It is well known that if enterprises can successfully implement Industrial IoT (IIoT), they will benefit immensely and significantly improve production efficiency. However, we must not only focus … Read more

Essential Knowledge for Beginners in Cybersecurity: Understanding HTTP Packets

Essential Knowledge for Beginners in Cybersecurity: Understanding HTTP Packets

1. What is an HTTP Packet What is HTTP HTTP: (HyperText Transfer Protocol) is the protocol used for transferring hypertext from World Wide Web (WWW) servers to local browsers. HTTP is a protocol based on the TCP/IP communication protocol for transmitting data (HTML files, image files, query results, etc.). HTTP is an application layer protocol, … Read more

Research on Network Attack Prediction Technology in Industrial Control Systems

Research on Network Attack Prediction Technology in Industrial Control Systems

Authors: Ding Chaohui, Zhang Wei, Yang Guoyu, Liu Teng Affiliations: 1.China Datang Corporation Science and Technology Research Institute Co., Ltd., Beijing 100043. Abstract: In the face of complex network security situations, attackers often employ extensive information reconnaissance, vulnerability exploitation, and obfuscation techniques to conduct malicious activities or destructive actions on the network. Although current network … Read more

Essential Bluetooth Security Knowledge You Must Know

Essential Bluetooth Security Knowledge You Must Know

The DHS 4300A series manual, released by the U.S. Department of Homeland Security, aims to guide the secure use of wireless technologies in sensitive systems. The manual includes usage specifications for various wireless technologies such as RFID and Bluetooth. Next, we will analyze the guidance requirements for Bluetooth technology in this manual. DHS 4300A –Q6 … Read more

Unpacking Malware: Weak Encryption Algorithms

Unpacking Malware: Weak Encryption Algorithms

A few days ago, I started writing a series of articles about tools and methods for unpacking malware. Each piece of malware or packer is different, and sometimes a universal method cannot be used for unpacking. However, common characteristics can sometimes be found. For example, packers often use weak encryption algorithms, and breaking these algorithms … Read more

Development Trends, Challenges, and Recommendations for IoT Security

The Internet of Vehicles (IoV) is a new industrial form that deeply integrates next-generation information technologies such as 5G, artificial intelligence, big data, and cloud computing with the automotive, electronics, and road traffic fields. It serves as an important carrier for accelerating the development of new productive forces and building new competitive advantages for the … Read more

Interpretation and Testing Approaches for IoT Perception Terminal Security Standards

Interpretation and Testing Approaches for IoT Perception Terminal Security Standards

Author | Zhang Xiaoming, Cao Kejian, Peng Guangming Everything is a computer. Everything is connected. With the development of “informationization” and “intelligence” in human society, the trend of the Internet of Things (IoT) is emerging, from smart homes and smart grids to smart cities and industrial IoT, the integration of cyberspace and the real world … Read more