https://www.darkreading.com/vulnerabilities—threats/anatomy-of-an-attack-on-the-industrial-iot-/a/d-id/1331097
This article details an attack on an IoT device. Similar to the kill chain, the attacker follows a recon, development, execution and command and control phase. Reminds the vulnerabilities with IoTs supporting critical infrastructure.
Leave a Reply
You must be logged in to post a comment.