Research presented during Black Hat Europe demonstrates how attackers can abuse business applications connected to ICS and SCADA gear.
Research presented during Black Hat Europe demonstrates how attackers can abuse business applications connected to ICS and SCADA gear.