
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CRASHOVERRIDE Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<atom:link href="https://www.icscybersecurityconference.com/tag/crashoverride/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.icscybersecurityconference.com/tag/crashoverride/</link>
	<description>ICS Cybersecurity Conference - Industrial/SCADA Cybersecurity</description>
	<lastBuildDate>Mon, 10 Jul 2017 10:42:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.icscybersecurityconference.com/wp-content/uploads/2016/09/favicon.png</url>
	<title>CRASHOVERRIDE Archives - Industrial Control Systems (ICS) Cybersecurity Conference</title>
	<link>https://www.icscybersecurityconference.com/tag/crashoverride/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Modular, Network-based ICS Threats Mean to Your Systems</title>
		<link>https://www.icscybersecurityconference.com/modular-network-based-ics-threats-mean-systems/</link>
					<comments>https://www.icscybersecurityconference.com/modular-network-based-ics-threats-mean-systems/#respond</comments>
		
		<dc:creator><![CDATA[Industry News]]></dc:creator>
		<pubDate>Mon, 10 Jul 2017 10:42:34 +0000</pubDate>
				<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT Attacks]]></category>
		<category><![CDATA[CRASHOVERRIDE]]></category>
		<category><![CDATA[Industroyer]]></category>
		<guid isPermaLink="false">http://www.icscybersecurityconference.com/?p=1483</guid>

					<description><![CDATA[<p>By Cameron Camp, Security Researcher, ESET Industroyer, the recent complex malware targeting industrial control systems, offers attackers a modular complex way to attack systems like the power grid. What are the implications of this? For years, adversaries have been quietly testing the defenses of bulk critical infrastructure like gas and oil systems, hydroelectric dams and the power grid. In recent years, starting with Stuxnet in 2010, more focused attempts at directly manipulating industrial systems have started to gain prominence, including [&#8230;]</p>
<p>The post <a href="https://www.icscybersecurityconference.com/modular-network-based-ics-threats-mean-systems/">What Modular, Network-based ICS Threats Mean to Your Systems</a> appeared first on <a href="https://www.icscybersecurityconference.com">Industrial Control Systems (ICS) Cybersecurity Conference</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.icscybersecurityconference.com/modular-network-based-ics-threats-mean-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
