The Latest OT/IoT Cybersecurity Threat Landscape – 2H 2024 Review

Nozomi Networks Labs leverages a network of more than 50,000 global honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources to continuously uncover trends, novel attack methods and unique insights that are critical for safeguarding industrial and cyber-physical systems.

Our latest OT/IoT Security Report takes a deep dive into activity and trends we observed during the second half of 2024, including:

  • Top MITRE ATT&CK TTPs gleaned from anonymized customer telemetry data, broken out by country and industry
  • Unseen risks in industrial wireless environments, namely deauthentication attacks and emerging threats to drones
  • Latest CISA ICS advisories by sector, including their CVSS and EPSS risk scores, and associated CWEs 
  • IoT botnet malicious activity observed in our global honeypots by country of origin, including top credentials used, commands executed and payloads delivered
  • New malware targeting critical infrastructure

Join us to gain fresh insights into how OT and IoT are being targeted by malicious threat actors and take away specific actions you can take to increase cyber and operational resilience.

View Resource

Speakers

The Latest OT/IoT Cybersecurity Threat Landscape – 2H 2024 Review
Webinar

The Latest OT/IoT Cybersecurity Threat Landscape – 2H 2024 Review

February 25, 2025
11 AM EST & 1 PM AEST

Nozomi Networks Labs leverages a network of more than 50,000 global honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources to continuously uncover trends, novel attack methods and unique insights that are critical for safeguarding industrial and cyber-physical systems.

Our latest OT/IoT Security Report takes a deep dive into activity and trends we observed during the second half of 2024, including:

  • Top MITRE ATT&CK TTPs gleaned from anonymized customer telemetry data, broken out by country and industry
  • Unseen risks in industrial wireless environments, namely deauthentication attacks and emerging threats to drones
  • Latest CISA ICS advisories by sector, including their CVSS and EPSS risk scores, and associated CWEs 
  • IoT botnet malicious activity observed in our global honeypots by country of origin, including top credentials used, commands executed and payloads delivered
  • New malware targeting critical infrastructure

Join us to gain fresh insights into how OT and IoT are being targeted by malicious threat actors and take away specific actions you can take to increase cyber and operational resilience.

Nozomi Networks Labs leverages a network of more than 50,000 global honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources to continuously uncover trends, novel attack methods and unique insights that are critical for safeguarding industrial and cyber-physical systems.

Our latest OT/IoT Security Report takes a deep dive into activity and trends we observed during the second half of 2024, including:

  • Top MITRE ATT&CK TTPs gleaned from anonymized customer telemetry data, broken out by country and industry
  • Unseen risks in industrial wireless environments, namely deauthentication attacks and emerging threats to drones
  • Latest CISA ICS advisories by sector, including their CVSS and EPSS risk scores, and associated CWEs 
  • IoT botnet malicious activity observed in our global honeypots by country of origin, including top credentials used, commands executed and payloads delivered
  • New malware targeting critical infrastructure

Join us to gain fresh insights into how OT and IoT are being targeted by malicious threat actors and take away specific actions you can take to increase cyber and operational resilience.

SPEAKERS
Anton Shipulin
Industrial Cybersecurity Evangelist, Nozomi Networks
Javier Rascón Mesa
Sr. Cyber Threat Analyst, Nozomi Networks

Nozomi Networks Labs leverages a network of more than 50,000 global honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources to continuously uncover trends, novel attack methods and unique insights that are critical for safeguarding industrial and cyber-physical systems.

Our latest OT/IoT Security Report takes a deep dive into activity and trends we observed during the second half of 2024, including:

  • Top MITRE ATT&CK TTPs gleaned from anonymized customer telemetry data, broken out by country and industry
  • Unseen risks in industrial wireless environments, namely deauthentication attacks and emerging threats to drones
  • Latest CISA ICS advisories by sector, including their CVSS and EPSS risk scores, and associated CWEs 
  • IoT botnet malicious activity observed in our global honeypots by country of origin, including top credentials used, commands executed and payloads delivered
  • New malware targeting critical infrastructure

Join us to gain fresh insights into how OT and IoT are being targeted by malicious threat actors and take away specific actions you can take to increase cyber and operational resilience.

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Anton Shipulin
Industrial Cybersecurity Evangelist, Nozomi Networks
Javier Rascón Mesa
Sr. Cyber Threat Analyst, Nozomi Networks
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

The Latest OT/IoT Cybersecurity Threat Landscape – 2H 2024 Review

Nozomi Networks Labs leverages a network of more than 50,000 global honeypots, wireless monitoring sensors, inbound telemetry, partnerships, threat intelligence and other resources to continuously uncover trends, novel attack methods and unique insights that are critical for safeguarding industrial and cyber-physical systems.

Our latest OT/IoT Security Report takes a deep dive into activity and trends we observed during the second half of 2024, including:

  • Top MITRE ATT&CK TTPs gleaned from anonymized customer telemetry data, broken out by country and industry
  • Unseen risks in industrial wireless environments, namely deauthentication attacks and emerging threats to drones
  • Latest CISA ICS advisories by sector, including their CVSS and EPSS risk scores, and associated CWEs 
  • IoT botnet malicious activity observed in our global honeypots by country of origin, including top credentials used, commands executed and payloads delivered
  • New malware targeting critical infrastructure

Join us to gain fresh insights into how OT and IoT are being targeted by malicious threat actors and take away specific actions you can take to increase cyber and operational resilience.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.