Research Report: Assessing the Threat Landscape

This semi-annual report covers the threat and vulnerability landscape for the second half of 2023.

Report Highlights

Nozomi Networks Labs analysis found that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.  

This latest report shares:

  • Analysis of ICS vulnerabilities released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
  • Real-world telemetry data from Nozomi Networks-deployed monitoring and detection software in enterprise and operational technology (OT) networks
  • The latest patterns in IoT technology abuse based on Nozomi Networks Labs honeypot deployments
View Resource

Speakers

Research Report: Assessing the Threat Landscape
Research Reports

Research Report: Assessing the Threat Landscape

February 8, 2024

This semi-annual report covers the threat and vulnerability landscape for the second half of 2023.

Report Highlights

Nozomi Networks Labs analysis found that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.  

This latest report shares:

  • Analysis of ICS vulnerabilities released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
  • Real-world telemetry data from Nozomi Networks-deployed monitoring and detection software in enterprise and operational technology (OT) networks
  • The latest patterns in IoT technology abuse based on Nozomi Networks Labs honeypot deployments

This semi-annual report covers the threat and vulnerability landscape for the second half of 2023.

Report Highlights

Nozomi Networks Labs analysis found that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.  

This latest report shares:

  • Analysis of ICS vulnerabilities released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
  • Real-world telemetry data from Nozomi Networks-deployed monitoring and detection software in enterprise and operational technology (OT) networks
  • The latest patterns in IoT technology abuse based on Nozomi Networks Labs honeypot deployments
SPEAKERS

This semi-annual report covers the threat and vulnerability landscape for the second half of 2023.

Report Highlights

Nozomi Networks Labs analysis found that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.  

This latest report shares:

  • Analysis of ICS vulnerabilities released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
  • Real-world telemetry data from Nozomi Networks-deployed monitoring and detection software in enterprise and operational technology (OT) networks
  • The latest patterns in IoT technology abuse based on Nozomi Networks Labs honeypot deployments
IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

Research Report: Assessing the Threat Landscape

This semi-annual report covers the threat and vulnerability landscape for the second half of 2023.

Report Highlights

Nozomi Networks Labs analysis found that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.  

This latest report shares:

  • Analysis of ICS vulnerabilities released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
  • Real-world telemetry data from Nozomi Networks-deployed monitoring and detection software in enterprise and operational technology (OT) networks
  • The latest patterns in IoT technology abuse based on Nozomi Networks Labs honeypot deployments

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.