1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks

Discussion in 'Threatpost' started by RSS, Nov 16, 2015.

  1. RSS

    RSS New Member Member

    Research presented during Black Hat Europe demonstrates how attackers can abuse business applications connected to ICS and SCADA gear.

    Continue reading...
     

Share This Page