Limes Security presents building automation research at international „Black Hat USA“ conference in Las Vegas 31/07/2017

These days the world‘s leading information security congress „Black Hat USA“ takes place in Las Vegas for the 20th time. At this event around 15.000 attendees are provided with the latest research, development and trends concerning IT security. Only the best and most reknown speakers are being selected to speak at Blackhat USA. Speaking on […]

MORE
Increasing application security through secure coding 25/07/2017

Application security is a team effort, and you have to factor it in during the application development process. To help a team of developers learn about these security topics and support them with learning how to correctly handle them, Limes Security held a workshop on the topic of secure coding. Adapted to the individual need […]

MORE
Industroyer aka Crashoverride – A big new threat for ICS 14/06/2017

Industroyer is the first malware designed and developed to attack electric power grids. This sophisticated piece of malware found by security analysts of ESET works in a very disruptive manner and was responsible for the latest power out in Ukraine. Because of the modular structure the malware can be easily extended to other industrial sectors. […]

MORE
Limes Security writes an article for the German IT-magazine LANline about the security of industrial systems. 29/03/2017

In the article “Sicherheit 4.0 für Industrieanlagen” (Translation: Security 4.0 for Industrial Control Systems) Mr. Thomas Brandstetter describes some pitfalls and problems concerning control systems and shows measures to increase their IT-Security. http://www.lanline.de/sicherheit-4-0-fuer-industrieanlagen/

MORE
ICS Security Workshop at ICS-CSR in Belfast 26/07/2016

Limes Security will be conducting a security workshop at the Industrial Control System Cyber Security Research (ICS-CSR) conference, taking place for the fourth time, this year from August 23rd-25th 2016 at Queen’s University Belfast. The workshop “Assessing & Exploiting ICS Vulnerabilities” allows participants to take the first steps into testing for and exploiting vulnerabilities of industrial systems. ICS-CSR […]

MORE