Search


2 min read
Bluetooth Hacking, January 28-30
Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT...
3,562 views

2 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2,180 views

6 min read
Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
1,476 views


4 min read
SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Welcome back, my aspiring SCADA Hackers! The recent ransomware attack against the Colonial Pipeline in the US reminds us that SCADA/ICS...
6,129 views

3 min read
SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
4,053 views


5 min read
SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
14,686 views


6 min read
The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West
Welcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
4,591 views


3 min read
Round 2 of the Great Cyberwar of 2022: Attacking Russia's Schneider Electric SCADA/ICS Sites
Welcome back, my cyber warriors! Round 1 of the Great Cyberwar of 2022 went to Ukraine and its allies from around the world. Among the...
13,508 views


4 min read
SCADA Hacking: The Key Differences between Security of SCADA and Traditional IT systems
For those who are coming from a traditional IT or IT security background, SCADA/ICS systems security can prove prove daunting. Many of...
19,181 views


4 min read
Mr Robot Hacks: How Elliot Used a Raspberry Pi to Hack Steel Mountain
Welcome back, my Mr Robot afacionados! A number of you have written me telling me how much you enjoy the Mr. Robot series on USA Network...
12,169 views


1 min read
SCADA Hacking: "Mysterious" Explosions and Fires at Russian Industrial Sites
Welcome back, my cyberwarrior heroes! As I mentioned in my second interview with David Bombal, the second round of the Ukraine/Russia...
3,444 views

4 min read
SCADA Hacking and Security: This is How the World Ends!
As the cyberwar to save Ukraine enters Round 2, SCADA/ICS is likely to become the target of both sides. In this article, I simply try to...
12,971 views

6 min read
Ransomware, Part 1: History and Evolution of Ransomware and Ransomware Attacks
Welcome back, my aspiring cyberwarriors! Recent events have once again emphasized the importance of SCADA security! On May 7, 2021,...
1,406 views


5 min read
SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important...
11,844 views


5 min read
SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
6,625 views


3 min read
SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any...
2,797 views


4 min read
SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)
Welcome back, my aspiring SCADA/ICS cyberwarriors! Let's begin by congratulating you on your foresight in committing to study SCADA/ICS...
5,376 views