Internet-exposed ICS significantly more prevalent in the US
Water and wastewater systems were particularly vulnerable to attacks leveraging internet-exposed ICS, with exploitation possible in almost 50% of human-machine interfaces used by such systems even without authentication.
Attackers could not exploit the flaw to allow arbitrary memory address write or program execution even if they could manipulate kernel memory, said CrowdStrike Vice President Adam Meyers.
Attempted modifications to the portions of the draft that received contention were ultimately thumbed down, resulting in a final draft not far off from earlier iterations.
CyberRisk TV speaks with Ox Security's Boaz Barzel on overcoming common obstacles, ensuring that security measures keep pace with rapid technological advancements.