The Hidden Threat Of Cyberattacks In The Energy And Utilities Industry: 2018 Spotlight Report
By Vectra
Added
This report offers research on analysis and lifecycle of an attack on critical infrastructure. It discusses command and control, internal reconnaissance, lateral movement, and targeting the ICS and SCADA infrastructure.
Tags
Threat actor C2 Reconnaissance Criminal group Security incident Attack campaign Endpoint 3rd party services Confidentiality Control systemsTopic Map
