ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

PIPEDREAM – Most Flexible & Capable ICS Malware To Date

Автор: S4 Events

Загружено: 2022-05-02

Просмотров: 10154

Описание: Rob Lee, founder and CEO of Dragos, gives the opening keynote of S4x22 Day 2 on the ICS malware they call PIPEDREAM. The first third of the keynote focuses on what this means for asset owners and how they should react. Who should prioritize threat hunting ("you don't get to vote if you are a target")?

The remainder of the talk is on the malware itself and a bit on mitigations. The PLC Proxy capabilities is particularly interesting. Even if you have heard about INCONTROLLER/PIPEDREAM before you will find this a worthwhile watch.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
PIPEDREAM – Most Flexible & Capable ICS Malware To Date

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Industroyer2 with Robert Lipovsky of ESET

Industroyer2 with Robert Lipovsky of ESET

Разбор инфраструктуры реального проекта. Стоит ли внедрять Kubernetes?

Разбор инфраструктуры реального проекта. Стоит ли внедрять Kubernetes?

TRITON - Анализ и раскрытие информации компанией Schneider Electric

TRITON - Анализ и раскрытие информации компанией Schneider Electric

2. ICS Security Architecture with Dale Peterson

2. ICS Security Architecture with Dale Peterson

1. Introduction, Threat Models

1. Introduction, Threat Models

How to Perform Effective OT Cyber Security Risk Assessments

How to Perform Effective OT Cyber Security Risk Assessments

Webinar: OT Cybersecurity for IT Professionals

Webinar: OT Cybersecurity for IT Professionals

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Langner's Stuxnet Deep Dive

Langner's Stuxnet Deep Dive

WebAssembly at the IoT Edge

WebAssembly at the IoT Edge

Is The Purdue Model Dead?

Is The Purdue Model Dead?

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

ICS Security Assessment Methodology, Tools & Tips

ICS Security Assessment Methodology, Tools & Tips

OT Security 101 Training: How to Get Started

OT Security 101 Training: How to Get Started

Building a Secure OT Network | SANS ICS Concepts

Building a Secure OT Network | SANS ICS Concepts

A Tale Of Two (Very Different) Secure ICS Architectures

A Tale Of Two (Very Different) Secure ICS Architectures

Challenges Of Using IEC 62443 To Secure IIoT

Challenges Of Using IEC 62443 To Secure IIoT

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

How to Implement Network Segmentation in OT | Verve is now Rockwell Automation SecureOT

The Industrial Cyberthreat Landscape: 2019 Year in Review

The Industrial Cyberthreat Landscape: 2019 Year in Review

Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020

Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]