OT Security Sunday is a technical series from FOXGRID exploring industrial cybersecurity, industrial systems, and engineering realities — through practical, hands-on insights.
We look at how PLCs, industrial protocols, embedded devices, and smart factory systems actually behave — sometimes offensively, sometimes defensively — always with engineering honesty.
This is intentionally not a live session. From APAC to Europe to the Americas, you can watch it whenever it fits your Sunday.
It’s 10 focused minutes. That’s all it takes to sharpen your edge in OT security.
One focused 10-minute deep dive into industrial cybersecurity and engineering realities.
No hype. No fear marketing. Just practical insights you can actually think about.
Watch it whenever it fits your schedule — from APAC to Europe to the Americas
Bypass vendor restrictions and access the underlying Linux operating system using the hardware interfaces of a Flipper Zero
On this ICS/OT communication server, attackers might execute arbitrary commands, potentially leading to a complete compromise of the system.
Let's continue to explore Conpot and look into the template guardian_ast, mimicking a Veeder-Root TLS-350 gas station controller.
In the second part of the Conpot beginners series, we’re simulating a cyber attack on an IEC-104 infrastructure substation.
In this guide, we’ll look into the basics of scanning ICS using Conpot, a popular open-source honeypot software designed for ICS e ...