OT/IoT Security Report - January 2023

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape

Speakers

OT/IoT Security Report - January 2023
Research Reports

OT/IoT Security Report - January 2023

January 18, 2023

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape
SPEAKERS

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape
IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

OT/IoT Security Report - January 2023

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.