Security News > 2018 > July > How hackers exploit critical infrastructure
![How hackers exploit critical infrastructure](/static/build/img/news/alt/cyberattack-statistics-1-medium.jpg)
The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, that malicious hacking activity would be increasingly targeted in this direction. It also stands to reason that the salient aspects of hacking – namely, remote access, … More → The post How hackers exploit critical infrastructure appeared first on Help Net Security.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/zJ8R6soeyBI/
Related news
- U.S. Government Releases New AI Security Guidelines for Critical Infrastructure (source)
- Hackers exploit LiteSpeed Cache flaw to create WordPress admins (source)
- America's enemies targeting US critical infrastructure should be 'wake-up call' (source)
- Critical infrastructure security will stay poor until everyone pulls together (source)
- Helsinki suffers data breach after hackers exploit unpatched flaw (source)
- North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign (source)
- Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking (source)
- PoC exploits for critical FortiSIEM command execution flaws released (CVE-2024-23108, CVE-2023-34992) (source)
- Exploit for critical Progress Telerik auth bypass released, patch now (source)
- Hackers Exploit Legitimate Packer Software to Spread Malware Undetected (source)