ICS/OT Threat Intelligence: Protecting the Industrial Edge
CTI for Industrial Control Systems (ICS) and OT. Understand the Purdue Model, specialized protocols (Modbus, DNP3), and threats targeting critical infrastructure.
Your comprehensive reference for cyber threat intelligence terminology. Explore definitions of malware families, APT groups, attack techniques, and security concepts.
Showing 4 entries starting with I
Clear filtersCTI for Industrial Control Systems (ICS) and OT. Understand the Purdue Model, specialized protocols (Modbus, DNP3), and threats targeting critical infrastructure.
Move beyond IP addresses. Learn how to track threat actors using SSL/TLS fingerprinting techniques like JA3, JA3S, and JARM to identify C2 servers.
Initial Access Brokers (IABs) are specialized cybercriminals who breach corporate networks but do not monetize the intrusion themselves. Instead, they sell the "access" (e.g., vali...
A mature CTI program moves beyond blocking IPs (Tactical) and focuses on hunting TTPs (Operational).