OT/IoT Security Report - January 2023

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape

Speakers

OT/IoT Security Report - January 2023
Research Reports

OT/IoT Security Report - January 2023

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape

Speakers

OT/IoT Security Report - January 2023

Report Highlights

  • Hacktivists leveraging malware to launch nation-state like destructive attacks on critical infrastructure
  • Hospital systems becoming increasingly targeted due to the sensitive nature of their data and dependence of critical systems for operations
  • Exclusive Nozomi Networks data on critical intrusion alerts and common malware categories affecting Enterprise, OT, and IoT
  • Insights from our custom honeypots on how malicious botnets are attempting to access Internet of Things (IoT)
  • Most vulnerable industries, statistics on vulnerable products, and most exploited vulnerability types following Common Weakness Enumeration (CWE) classifications
  • Recommendations and what to expect in the 2023 threat landscape

Subscribe

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.