Security Breach: Dark AI, Hacker Evolutions Speeding Vulnerability Exploitation

Deeper dives into OT priorities will be key to making breaches more difficult.

In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people?

I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused on vulnerabilities and the threat landscape, discussing these topics led to deeper dives on a range of topics that also included breaking down IT/OT silos, artificial intelligence, the dark web and patching strategies. 

Watch/listen as we discuss:

  • The transformation of threat actors and how they've been able to cut timelines for exploiting vulnerabilities to 15 days.
  • How hackers are using Dark Web versions of ChatGPT to design more effective credential and data harvesting schemes.
  • Why the security of every software platform, especially those embedded within industrial assets, cannot be assumed.
  • How the legacy dynamic of many OT assets has led hackers to exploit vulnerabilities that have been around for as long as five years.
  • Addressing patching challenges by breaking down silos and getting a deeper understanding of the unique elements of each OT environment.
  • How threat detection needs to evolve, especially with state-sponsored hackers executing "quieter" strategies for attacking manufacturing and critical infrastructure. 

To catch up on past episodes, you can go to Manufacturing.netIEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

More in Cybersecurity