Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities
By Zero Day Initiative, Trend Micro
Added
The Stuxnet and Ukranian power grid attacks give us clear ideas about how much damage a determined adversary can inflict not only on the business or operation concerned, but also on the general public. This paper takes a look at critical infrastructure attacks.
Tags
Vulnerability Threat actor Credentials Injection attack- Application security Vuln management Fuzz testing Human error Malware Web applicationTopic Map
