July 20, 2023, 1:10 a.m. | Richard Derbyshire, Benjamin Green, Charl van der Walt, David Hutchison

cs.CR updates on arXiv.org arxiv.org

For decades, operational technology (OT) has enjoyed the luxury of being
suitably inaccessible so as to experience directly targeted cyber attacks from
only the most advanced and well-resourced adversaries. However, security via
obscurity cannot last forever, and indeed a shift is happening whereby less
advanced adversaries are showing an appetite for targeting OT. With this shift
in adversary demographics, there will likely also be a shift in attack goals,
from clandestine process degradation and espionage to overt cyber extortion
(Cy-X). …

advanced adversaries attacks cyber cyber attacks cyber extortion dead experience extortion indeed operational operational technology plc security technology

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)