Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

PIPEDREAM – Most Flexible & Capable ICS Malware To Date

Автор: S4 Events

Загружено: 2022-05-02

Просмотров: 10110

Описание:

Rob Lee, founder and CEO of Dragos, gives the opening keynote of S4x22 Day 2 on the ICS malware they call PIPEDREAM. The first third of the keynote focuses on what this means for asset owners and how they should react. Who should prioritize threat hunting ("you don't get to vote if you are a target")?

The remainder of the talk is on the malware itself and a bit on mitigations. The PLC Proxy capabilities is particularly interesting. Even if you have heard about INCONTROLLER/PIPEDREAM before you will find this a worthwhile watch.

PIPEDREAM – Most Flexible & Capable ICS Malware To Date

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Dragos CEO Rob Lee Discusses the Dragos Mission & Culture

Dragos CEO Rob Lee Discusses the Dragos Mission & Culture

A Tale Of Two (Very Different) Secure ICS Architectures

A Tale Of Two (Very Different) Secure ICS Architectures

Industroyer2 with Robert Lipovsky of ESET

Industroyer2 with Robert Lipovsky of ESET

Challenges Of Using IEC 62443 To Secure IIoT

Challenges Of Using IEC 62443 To Secure IIoT

Webinar: OT Cybersecurity for IT Professionals

Webinar: OT Cybersecurity for IT Professionals

DEF CON 30  - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

PIPEDREAM and Countering ICS Malware Webcast

PIPEDREAM and Countering ICS Malware Webcast

Langner's Stuxnet Deep Dive

Langner's Stuxnet Deep Dive

ICS/OT Secure Remote Access

ICS/OT Secure Remote Access

Is The Purdue Model Dead?

Is The Purdue Model Dead?

let’s play with a ZERO-DAY vulnerability “follina”

let’s play with a ZERO-DAY vulnerability “follina”

2. ICS Security Architecture with Dale Peterson

2. ICS Security Architecture with Dale Peterson

TRITON - Schneider Electric Analysis and Disclosure

TRITON - Schneider Electric Analysis and Disclosure

The Industrial Cyberthreat Landscape: 2019 Year in Review

The Industrial Cyberthreat Landscape: 2019 Year in Review

Forced Digital Transformation and the Realities to ICS/OT Cybersecurity

Forced Digital Transformation and the Realities to ICS/OT Cybersecurity

OT Security 101 Training: How to Get Started

OT Security 101 Training: How to Get Started

WebAssembly at the IoT Edge

WebAssembly at the IoT Edge

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is  ICS and SCADA

What is OT | What are OT Cyber Security Challenges | OT Security Solutions | What is ICS and SCADA

Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020

Threat Intelligence and the Limits of Malware Analysis with Joe Slowik - SANS CTI Summit 2020

ICS Security Assessment Methodology, Tools & Tips

ICS Security Assessment Methodology, Tools & Tips

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]