1 Comment
User's avatar
Neural Foundry's avatar

The timing of the Schneider attack is particuarly nasty given how embedded their systems are in critical infrastructure globally. Once attackers have engineering schematics and supplier chains from a company like this, they're not just looking at one breach, they're mapping an entire ecosystem of secondary targets. Organizations running their automation platforms need to be auditing third party access and segmenting OT networks yesterday.

Expand full comment