Kaspersky卡巴斯基:2024年第四季度工业自动化系统威胁景观报告(英文版).pdf |
下载文档 |
资源简介
Malicious objects that are used for initial infection of ICS computers include dangerous internet resources that are added to denylists, malicious scripts and phishing pages, and malicious documents. By the logic of cybercriminals, these malicious objects can spread easily. As a result, they are blocked by security solutions more often than anything else. This is reflected in our statistics. Typical attacks blocked within an OT network are a multi-stage process, where each subsequent step of
本文档仅能预览20页