Research &
Intelligence

Your trusted source for the latest ICS vulnerability research, industrial threat intelligence, and educational information about best practices for IIoT, ICS and SCADA security.

A data-driven analysis of real-world vulnerabilities observed in more than 850 production ICS networks across all industrial sectors and 6...

The risks associated with OT differ significantly from those related to IT – and they need to be understood by...

The EU recently passed the Network and Information Security (NIS) Directive (NISD), requiring critical infrastructure organizations to implement stronger security...

Hacking Industrial Control Systems — Chapters 1 & 2 Your Hands-On Guide to ICS Risk Management. Download your complimentary copy...

In 2015, CyberX’s threat intelligence team reverse-engineered BlackEnergy3 and discovered it was designed to perform exfiltration of sensitive information from...

Get your complimentary copy of Chapter 1 from this recently-published guide to ICS and SCADA security. Written by ICS/SCADA security...

Download your complimentary overview of best practices risk assessments for ICS and SCADA security, and learn how to implement an...

The CyberX Threat Intelligence team has discovered numerous zero-day vulnerabilities in Programmable Logical Controllers (PLCs) and industrial equipment, ranging from...

Months before Mirai malware was found to be infecting IoT devices, CyberX's threat intelligence team discovered RADIATION. Targeting surveillance cameras...

A data-driven analysis of vulnerabilities in real-world OT networks based on analyzing 375 industrial control networks via Network Traffic Analysis...