LevelBlue + SentinelOne: Global Partnership to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More

28 Minute Watch Ziv Mador,
VP Security Research, LevelBlue SpiderLabs

The rise of IT/OT convergence has transformed cybersecurity in manufacturing, opening up new vulnerabilities and attack vectors. As manufacturing environments become more connected—from shop floors to enterprise networks and global supply chains—the risk of cyberattacks is escalating.

Manufacturers now face a growing array of threats, from disruptive ransomware attacks to data breaches compromising sensitive intellectual property. Industry 4.0 technologies like the Industrial Internet of Things (IIoT) and cloud-based platforms have expanded the attack surface, making organizations even more susceptible to cybercriminal activity.

Cybersecurity breaches in manufacturing can lead to crippling downtime, safety incidents, and irreparable reputational damage. The fallout from these breaches can range from financial losses to severe consequences for both property and human life.

In this session, we discuss Real-World Attack Tactics. Press play to learn from the latest cyberattacks targeting the manufacturing industry and gain insight into the tactics cybercriminals are using to breach these environments.

Related Resources

Current: resourceswebinarsattacks-in-action-real-world-threats-and-how-theyre-targeting-manufacturing
Resource: resourceswebinarshow-we-detected-a-suspected-north-korean-it-worker
Webinar

How We Detected a Suspected North Korean IT Worker

Current: resourceswebinarsattacks-in-action-real-world-threats-and-how-theyre-targeting-manufacturing
Resource: resourceswebinarstracing-a-multi-vector-malware-campaign-from-vbs-to-open-infrastructure
Webinar

Tracing a Multi-Vector Malware Campaign: From VBS to Open Infrastructure

Current: resourceswebinarsattacks-in-action-real-world-threats-and-how-theyre-targeting-manufacturing
Resource: resourceswebinarsepic-fury-decoded-irans-cyber-escalation-playbook
Webinar

Epic Fury Decoded: Iran's Cyber Escalation Playbook