Exploitable Vulnerabilities Hidden Deep in OT Assets

Exploitable Vulnerabilities Hidden Deep in OT Assets

A type of vulnerability in an OT cybersecurity strategy termed “delicate by design,” poses a great risk since many OT systems contain traits in their configuration schema that can be exploited by threat actors.  PAS conducted a statistical analysis on over 50,000 assets to identify common “delicate by design” attributes that increase cybersecurity risks.