“Because ThroughTek’s P2P library has been integrated by multiple vendors into many different devices over the years, it’s virtually impossible for a third party to track the affected products,” Nozomi researchers said.
Recent Posts
Tags
Critical infrastructure (8)
Critical Infrastructure Cybersecurity (36)
Critical Infrastructure Security (9)
cybersecurity (69)
cyber threat analysis (5)
Defense in Depth (7)
Guardian (6)
ICS anomaly detection (23)
ICS Asset Inventory (13)
ICS Cybersecurity (63)
ICS Cybersecurity for Substations and Power Grids (5)
ICS Detection Challenge (7)
ICS intrusion detection (6)
ICS Operational Visibility (5)
ICS security (66)
ICS Threat Detection (5)
IEC 61850 (4)
IEC 62351 (9)
IIoT (6)
IIoT Security (7)
industrial control system (9)
Industrial Cybersecurity (52)
Industrial cybersecurity solutions (15)
industrial security (43)
Industroyer (7)
IoT (5)
IoT cybersecurity (15)
IoT devices (4)
IoT device security (5)
IoT Security (38)
IT/OT convergence (6)
Nozomi Networks (7)
Nozomi Networks Labs (5)
operational technology security (6)
OT Cybersecurity (34)
OT security (52)
Power Grid (5)
Power System Security (4)
ransomware (7)
S4 (5)
SANS ICS Survey (5)
SCADA security (12)
threat intelligence (7)
TRITON (8)
WG15 (6)