The security dilemma of smart factories [Part 1] Specificity of the programming languages used to move industrial robots

Industrial robots are the core of the automation of manufacturing processes in smart factories, and are the most important components as they support the manufacture of all kinds of products such as automobiles, aircraft, processed foods, and pharmaceuticals. In addition, Read More …

Tesla sues ex-employee over alleged ‘brazen’ theft of confidential code

Tesla is suing a former member of staff for allegedly stealing confidential information and attempting to cover his tracks in the aftermath. The lawsuit, filed in the US Northern District of California Court, names Alex Khatilov as the alleged perpetrator, Read More …

Weaponizing Open Source Software for Targeted Attacks

Trojanized open-source software is tricky to spot. This is because it takes on the façade of legitimate, non-malicious software, making it especially stealthy and useful for targeted attacks. However, a closer investigation can reveal suspicious behavior that exposes their malicious Read More …

Infrastructure as Code: Security Risks and How to Avoid Them

The ever-increasing demands on IT infrastructures and the rise of continuous integration and continuous deployment (CI/CD) pipelines have pushed the need for consistent and scalable automation. This is where infrastructure as code (IaC) comes into play. IaC is the provisioning, configuring, Read More …

Security Analysis of Devices That Support SCPI and VISA Protocols

When a legacy protocol is connected via Ethernet, and subsequently to the internet, security issues arise. Standard Commands for Programmable Instruments (SCPI) is a legacy protocol that many advanced measurement instruments support. It can be issued via General Purpose Interface Read More …