From IT to OT - Attack simulation against IT and OT
· 21 min read
Showing off an attack vector in a simulated environment, which illustrates how an attacker can compromise OT and critical infrastructure, with a foothold gained on an IT network.
Showing off an attack vector in a simulated environment, which illustrates how an attacker can compromise OT and critical infrastructure, with a foothold gained on an IT network.