A Threat Hunting Framework for Industrial Control Systems

An Industrial Control System (ICS) adversary often takes different actions to exploit vulnerabilities, pass the Chromium border between Information Technology (IT) and Operational Technology (OT) networks, and launch a targeted attack against OT networks.Detecting these threat actions in early phases before the final stage of the attacks can be exe

read more