Search Results

1,047 Results
Type
Resource Type
Industries
Partners
Products & Services
Threat Group
Topics
There are 1,047 results that match your search.
  • Impersonates victims, exploits vulnerabilities, targets internet-exposed endpoints, and exfiltrates data.
  • Targets Oracle e-buisness suite iSupplier web services and assets across multiple industrial sectors.
  • Compromises IT networks via insecure VPNs to conduct reconnaissance activities.
  • Uses perimeter device compromise and LOTL techniques for reconnaissance and exfiltration.
  • Defend production lines and industrial operations against ransomware, IP theft, and operational disruption with purpose-built OT security.
  • Whitepaper
    This whitepaper provides insight into how to do effective incident response for industrial control systems (ICS) that is based on years of collective experience supporting OT defenders.
  • Whitepaper
    Get this essential resource to understand how the Dragos Platform provides the most comprehensive OT-native network visibility and security monitoring solution
  • Spearphishing and credential theft for reconnaissance and espionage targeting industrial sectors.
  • Relies on phishing campaigns, password sprating, and malware delivery for reconnaissance.
  • Spearphishing with malicious documents or executables for initial access compromise.
  • Exploits known VPN vulnerabilities and open-source pentesting tools for reconnaissance, initial access, C2.
  • Development of ICS malware for physical disruption, causing unsafe conditions and long-term persistence.
  • Employs known malware for remote access, credential capture, and lateral movement.
  • Targets vulnerable external-facing network appliances to access IT networks and establish foothold.
  • Watering-hole attacks, malware and covert communication for reconnaissance.
  • Electric grid disruption and long-term persistence using LOTL tactics and custom ICS Malware.
  • Employs LOTL tactics to establish persistent access to victim environments.
  • Employs spearphishing and backdoor capabilities for initial access, reconnaissance, C2.
  • Case study
    Boston Beer modernized OT security with Dragos Platform + OT Watch, achieving 100% ROI in year one, reduced insurance costs, and stronger IT/OT alignment against cyber threats.
  • case study
    Discover how Lundin Mining fortified its operations against cyber threats and achieved remarkable success with Dragos OT cybersecurity solutions.
  • Guide
    Discover five key controls you should implement now to better secure your operational technology (OT) environments, and learn how you can get buy-in from executives to ensure the success of your ICS/OT security initiatives.
  • Solution Brief
    Learn how Dragos technology and professional services can strengthen the readiness and resiliency of your teams, enable secure modernization and innovation, and facilitate compliance while minimizing risk.
  • Solution Brief
    Learn about the Cybersecurity Capability Maturity Model (C2M2) and how Dragos solutions help industrial organizations implement and leverage C2M2 for stronger OT cybersecurity
  • Solution Brief
    Download our solution brief to learn how Dragos can help EU organisations prepare to meet and exceed the new requirements.
  • Solution Brief
    Facility Related Control Systems (FRCS) include controllers, sensors, valves, and networks that can be vulnerable to cyberattacks. Dragos technology and services help secure and protect these systems