PLATFORM
PLATFORM
THE DRAGOS PLATFORM
Asset Visibility
Passive & active
Vulnerability Management
Now, next, & never
Threat Detection
Fast, accurate, & complete
Response Playbooks
Fastest time to resolution
SERVICES
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
Dragos WorldView
The latest actionable intel
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
SERVICES
PROACTIVE SERVICES
OT Cyber Assessment
Evaluate & evolve architecture
Red Team Services
Identify vulnerabilities
OT Tabletop Exercises
Scenarios to evaluate response
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
Dragos WorldView
The latest actionable intel
Dragos WorldView Concierge & RFI
Intel customized for your org
Reactive Services
Incident Response
OT experts responding to your worst day
Rapid Response Retainer
IR experts available 24/7
Dragos 2025 OT Cybersecurity Year in Review
Understand the threats, vulnerabilities, and victories of the past year.
Explore The Intel
INSIGHTS
FUNDAMENTALS
OT Cybersecurity Basics
Build a stronger OT security strategy
5 Critical Controls
SANS ICS framework for defense
Industrial Risk Management
Quantifying OT risk and dependencies
THREATS
Monitoring Threat Groups
Know your adversary
Year in Review Report
8th annual threat report
REGULATIONS
OT Compliance
NIS2, CAF v4, SOCI/SONS, TSA, & more
NERC CIP
Dragos Alignment
INSM Compliance
Path for NERC-CIP-015
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
RESOURCES
RESOURCES
RESOURCES
Threat Reports
Whitepapers
Datasheets
Solution Briefs
Case Studies
Blog
Webinars
COMMUNITY
COMMUNITY
OT-CERT Program
Community Defense Program
ACADEMY
DRAGOS ACADEMY
On-Demand Training
Free OT Cybersecurity Quick Start Guide for IT
Essential reading for IT security pros tackling OT cybersecurity.
Download Now
COMPANY
ABOUT
About Dragos
We make defense doable
Leadership
Experts in defense
Newsroom
Up-to-date cyber news
Careers
Current job openings
EVENTS
Event Calendar
Connect in person
Dragos Industrial Security Conference
Register for DISC 2025
PARTNERS
Partner Ecosystem
Technology, Alliance, & GTM
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Explore the Intel
Contact Us
Menu
PLATFORM
PLATFORM
THE DRAGOS PLATFORM
Asset Visibility
Passive & active
Vulnerability Management
Now, next, & never
Threat Detection
Fast, accurate, & complete
Response Playbooks
Fastest time to resolution
SERVICES
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
Dragos WorldView
The latest actionable intel
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
SERVICES
PROACTIVE SERVICES
OT Cyber Assessment
Evaluate & evolve architecture
Red Team Services
Identify vulnerabilities
OT Tabletop Exercises
Scenarios to evaluate response
PLATFORM SERVICES
OT Watch
Proactive threat hunting
OT Watch Complete
Platform operations
Dragos WorldView
The latest actionable intel
Dragos WorldView Concierge & RFI
Intel customized for your org
Reactive Services
Incident Response
OT experts responding to your worst day
Rapid Response Retainer
IR experts available 24/7
Dragos 2025 OT Cybersecurity Year in Review
Understand the threats, vulnerabilities, and victories of the past year.
Explore The Intel
INSIGHTS
FUNDAMENTALS
OT Cybersecurity Basics
Build a stronger OT security strategy
5 Critical Controls
SANS ICS framework for defense
Industrial Risk Management
Quantifying OT risk and dependencies
THREATS
Monitoring Threat Groups
Know your adversary
Year in Review Report
8th annual threat report
REGULATIONS
OT Compliance
NIS2, CAF v4, SOCI/SONS, TSA, & more
NERC CIP
Dragos Alignment
INSM Compliance
Path for NERC-CIP-015
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Get The Report
RESOURCES
RESOURCES
RESOURCES
Threat Reports
Whitepapers
Datasheets
Solution Briefs
Case Studies
Blog
Webinars
COMMUNITY
COMMUNITY
OT-CERT Program
Community Defense Program
ACADEMY
DRAGOS ACADEMY
On-Demand Training
Free OT Cybersecurity Quick Start Guide for IT
Essential reading for IT security pros tackling OT cybersecurity.
Download Now
COMPANY
ABOUT
About Dragos
We make defense doable
Leadership
Experts in defense
Newsroom
Up-to-date cyber news
Careers
Current job openings
EVENTS
Event Calendar
Connect in person
Dragos Industrial Security Conference
Register for DISC 2025
PARTNERS
Partner Ecosystem
Technology, Alliance, & GTM
2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
See why Dragos was named a Leader in CPS Protection Platforms.
Explore the Intel
Contact Us
Login
Search Query
Submit Search
Show Search
Search Results
Submit
902 Results
Type
Author (62)
Industry (11)
Page (59)
Partner (66)
Threat Group (23)
Resource Type
Case Study (15)
Datasheet (35)
Guide (26)
Infographic (31)
News (6)
Partner Brief (29)
Press Release (68)
Report (34)
Solution Brief (41)
Video (2)
Webinar (66)
Whitepaper (39)
Industries
Building Automation Systems Cybersecurity (6)
Chemical Cybersecurity (6)
Electric Grid Cybersecurity (34)
Food & Beverage Cybersecurity (5)
Manufacturing Cybersecurity (25)
Metals & Mining Cybersecurity (3)
Oil & Gas Cybersecurity (26)
Pharmaceuticals Cybersecurity (5)
Public Sector Cybersecurity (4)
Transportation Cybersecurity (8)
Water & Wastewater Facilities Cybersecurity (15)
Partners
Anomali (2)
AWS (7)
Carahsoft Technology Corp (1)
Cisco (2)
CrowdStrike (5)
Cyolo (1)
Deloitte (4)
DreamPort (1)
Emerson (4)
Fortinet (3)
Garland Technology (1)
GE Vernova (2)
Hexagon (1)
IBM (2)
IBM Applications (1)
ICS Village (1)
ISA (1)
Keysight Technologies (2)
LogRhythm (1)
Micro Focus (2)
Microsoft Sentinel (1)
Owl Cyber Defense (1)
Palo Alto Networks (3)
PwC (1)
Rockwell Automation (5)
Schweitzer Engineering Laboratories (SEL) (3)
ServiceNow (3)
Splunk (5)
Splunk Applications (2)
Swimlane (1)
The Chertoff Group (1)
Trellix (2)
TruSTAR (1)
Yokogawa (1)
Products & Services
Asset Visibility (41)
Collective Defense (22)
DISC (7)
Professional Services (38)
The Dragos Platform (90)
Threat Intelligence & Hunting (165)
Training (12)
Threat Group
CHERNOVITE (5)
ELECTRUM (1)
TALONITE (1)
VOLTZITE (1)
XENOTIME (1)
Topics
Audit & Compliance (51)
Cyber Readiness (57)
Five Critical Controls (5)
Malware & Ransomware (43)
Network Security Monitoring (1)
OT Cybersecurity Fundamentals (8)
Risk Management (78)
Security Frameworks (20)
Year in Review (9)
There are 902 results that match your search.
Filters
Sort By
Relevance
Relevance
Newest
Oldest
VOLTZITE
Uses LOTL techniques for reconnaissance, enumeration, lateral movement, and long-term persistent access.
September 4, 2025 11:25 AM
HEXANE
Uses third-party connections from telecom providers for network access to industrial organizations.
September 4, 2025 11:23 AM
CHERNOVITE
Development of ICS malware to disrupt, degrate, and destroy industrial environments and processes.
September 4, 2025 11:19 AM
DYMALLOY
Deep ICS environment information gathering, including operator credentials and industrial processes.
September 4, 2025 11:15 AM
RASPITE
Credential capture and LOTL techniques employed for initial access, reconnaissance C2.
September 4, 2025 11:13 AM
KAMACITE
Spearphishing, exploiting SOHO routers, and leveraging custom capabilities to enable ELECTRUM operations.
September 4, 2025 11:11 AM
ALLANITE
Watering-hole and phishing attacks leading to ICS reconnaissance and screenshot collection.
September 4, 2025 11:08 AM
GANANITE
Impersonates victims, exploits vulnerabilities, targets internet-exposed endpoints, and exfiltrates data.
September 4, 2025 11:06 AM
LAURIONITE
Targets Oracle e-buisness suite iSupplier web services and assets across multiple industrial sectors.
September 4, 2025 10:57 AM
STIBNITE
Compromises IT networks via insecure VPNs to conduct reconnaissance activities.
September 4, 2025 10:55 AM
KOSTOVITE
Uses perimeter device compromise and LOTL techniques for reconnaissance and exfiltration.
September 4, 2025 10:53 AM
Manufacturing Cybersecurity
Defend production lines and industrial operations against ransomware, IP theft, and operational disruption with purpose-built OT security.
September 4, 2025 10:52 AM
Whitepaper
Incident Response for Operational Technology (OT)
This whitepaper provides insight into how to do effective incident response for industrial control systems (ICS) that is based on years of collective experience supporting OT defenders.
September 4, 2025 10:39 AM
Whitepaper
The Vital Role of OT-Native Network Visibility & Security Monitoring Amid IT Frameworks
Get this essential resource to understand how the Dragos Platform provides the most comprehensive OT-native network visibility and security monitoring solution
September 4, 2025 10:28 AM
GRAPHITE
Spearphishing and credential theft for reconnaissance and espionage targeting industrial sectors.
September 4, 2025 09:57 AM
MAGNALLIUM
Relies on phishing campaigns, password sprating, and malware delivery for reconnaissance.
September 4, 2025 09:55 AM
TALONITE
Spearphishing with malicious documents or executables for initial access compromise.
September 4, 2025 09:50 AM
PARISITE
Exploits known VPN vulnerabilities and open-source pentesting tools for reconnaissance, initial access, C2.
September 4, 2025 09:47 AM
XENOTIME
Development of ICS malware for physical disruption, causing unsafe conditions and long-term persistence.
September 4, 2025 09:39 AM
WASSONITE
Employs known malware for remote access, credential capture, and lateral movement.
September 4, 2025 09:33 AM
VANADINITE
Targets vulnerable external-facing network appliances to access IT networks and establish foothold.
September 4, 2025 09:31 AM
CHRYSENE
Watering-hole attacks, malware and covert communication for reconnaissance.
September 4, 2025 09:28 AM
ELECTRUM
Electric grid disruption and long-term persistence using LOTL tactics and custom ICS Malware.
September 4, 2025 09:20 AM
BENTONITE
Employs LOTL tactics to establish persistent access to victim environments.
September 4, 2025 09:18 AM
PETROVITE
Employs spearphishing and backdoor capabilities for initial access, reconnaissance, C2.
September 4, 2025 09:13 AM
Previous
11 of 37
Next