Exploiting the Industry 4.0 Supply Chain
The OPC unified architecture is growing in popularity as a platform-independent industrial communications architecture for connecting industrial systems to IT and the cloud. However, a chain of customizations and complexities in OPC-UA implementations has generated vulnerabilities in the software supply chain.
Eran Jacob from Otorio describes the research outlined in the Black Hat session "A Broken Chain: Discovering OPC UA Attack Surface and Exploiting the Supply Chain."
Read more about:
Black Hat NewsAbout the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024