{"version":"1.0","provider_name":"Inprosec","provider_url":"https:\/\/www.inprosec.com\/en\/","author_name":"Fernando Mosquera","author_url":"https:\/\/www.inprosec.com\/en\/author\/fernando-mosquera\/","title":"PLC vulnerabilities and Intrusion Detection Systems IIDS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"pI4VJmoJUt\"><a href=\"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/\">PLC vulnerabilities and Intrusion Detection Systems IIDS<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.inprosec.com\/en\/plc-vulnerabilities-and-intrusion-detection-systems-iids\/embed\/#?secret=pI4VJmoJUt\" width=\"600\" height=\"338\" title=\"&#8220;PLC vulnerabilities and Intrusion Detection Systems IIDS&#8221; &#8212; Inprosec\" data-secret=\"pI4VJmoJUt\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.inprosec.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/post-27-5.jpg","thumbnail_width":1200,"thumbnail_height":627,"description":"In today&#8217;s post, &#8220;Survey: PLC vulnerabilities and Industrial Intrusion Detection Systems IISD&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech. He explains through several recent works the vulnerabilities of PLC and different protocols to avoid them. Different techniques of IDS industrial intrusion detection systems are also presented, as well as a..."}