OT Threat Research
Real-time track and predict changes in the IoT/ICS threat landscape
We protect and alert the world's critical infrastructure by sharing leading threat and vulnerability research
TXOne Threat Research performs a variety of ICS device and protocol vulnerability research, analyzes potential threats, malware and ransomware related to OT Threat, and continues to share our research at top security conferences around the world such as Black Hat, DEFCON, RSA Conference, FIRST and etc. This can help us to provide our partners with the most real-time threat intelligence.
We provide early warning of potential risks and emerging vulnerabilities through threat intelligence
TXOne Threat Research continuously monitors and detects IoT/ICS threat terrain via our large-scale fully automated threat hunting system. Threat data is continuously gathered through a worldwide network of hunting engines, submissions, feedback loops, customers & partners, and our own Threat Research Labs researchers. The threat intelligence systems quickly protect our customers’ critical assets and operations.
Recommended Resources
White Papers
- In-Depth Analysis of Cyber Threats to Automotive Factories
- TXOne Networks 2021 Cybersecurity Report
- ICS Giants of the Fortune 500: The Frequency and Risk of Data Exposure
- Network Segmentation: The OT Standard for Industry 4.0
- The Hunt for Major League IoT and ICS Threats: A Deep Dive into IoT Threat Terrain
Blog
- Malware Analysis – LockBit 3.0
- Safeguarding OT environments against the LockBit 2.0 ransomware
- Critical ‘Log4Shell’ zero-day vulnerability likely to be widespread – here’s how to mitigate it
- TXOne Networks researcher discovers vulnerabilities in Bosch ethernet modules
- Beyond the attack event from Taiwan GSN