Hijacking a PLC Using its Own Network Features

Researcher to show how attackers can exploit the built-in advanced connectivity functions in some Rockwell PLCs.

Leave a Reply