Search
SCADA & ICS
SCADA and ICS security is a growing concern. Cybersecurity training on these vital systems identifying and mitigating potential threats that could disrupt essential services or cause catastrophic damage.


Cyberwar Mission #3: Using QRCodes in Phishing and Social Media Attacks
Welcome back, aspiring cyberwarriors. In this article, one of our fighters in Ukraine (Sierra) demonstrates how they use social...
8 min read
1,505 views


Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
6 min read
8,648 views


Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
5 min read
846 views

Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
3 min read
554 views


Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
5 min read
580 views

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2 min read
2,367 views


What is Zigbee and Why is it Used Extensively in SCADA and IoT?
Welcome back, my aspiring cyberwarriors! As our digital world expands to greater and greater physical space, the need for a simple,...
3 min read
777 views


Mr Robot Hacks: How Elliot and f/society Cloned the Key Card to Enter Steel Mountain
Welcome back, my Mr. Robot aficionados! As you know, Mr. Robot is my favorite TV show even though the show last aired nearly a decade...
4 min read
1,416 views


SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
4 min read
6,183 views

SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
3 min read
4,151 views


SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
5 min read
15,073 views


Round 2 of the Great Cyberwar of 2022: Attacking Russia's Schneider Electric SCADA/ICS Sites
Welcome back, my cyber warriors! Round 1 of the Great Cyberwar of 2022 went to Ukraine and its allies from around the world. Among the...
3 min read
13,535 views


SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
4 min read
19,295 views


SCADA Hacking: "Mysterious" Explosions and Fires at Russian Industrial Sites
Welcome back, my cyberwarrior heroes! As I mentioned in my second interview with David Bombal, the second round of the Ukraine/Russia...
1 min read
3,463 views

SCADA Hacking and Security: This is How the World Ends!
As the cyberwar to save Ukraine enters Round 2, SCADA/ICS is likely to become the target of both sides. In this article, I simply try to...
4 min read
13,003 views


Shodan: Using Shodan to Find Vulnerable Russian SCADA/ICS Sites
Welcome back, my aspiring cyberwarriors! As the war between Russia and Ukraine escalates, the risks to the world's peace and prosperity...
3 min read
9,989 views


SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
5 min read
12,033 views


SCADA Hacking: Finding Specific SCADA Systems with Censys
Welcome back, my aspiring SCADA Security Engineer! As you know, SCADA/ICS systems around the world are under attack. These systems are...
3 min read
2,052 views

Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL
Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester's job. Without good...
4 min read
16,782 views


SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
5 min read
6,654 views