PLAY PODCASTS
119,000 ICS Devices Exposed: The Internet’s Hidden Infrastructure Risk
Episode 88

119,000 ICS Devices Exposed: The Internet’s Hidden Infrastructure Risk

Daily Security Review

May 22, 202520m 0s

Audio is streamed directly from the publisher (media.transistor.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

In this episode, we dive into a growing cybersecurity crisis: the exposure of Industrial Control Systems (ICS) on the public internet. These systems power our electric grids, water supplies, and industrial automation—but thousands are reachable online, often unsecured.

We explore how researchers are working to distinguish between real ICS devices and honeypots—decoys used to bait cyber attackers. You’ll learn about scanning tools like Shodan, techniques like lightweight fuzzing and TTL analysis, and how attackers and defenders are racing to outsmart each other.

We’ll also unpack the latest data: over 119,000 potentially real ICS hosts exposed as of April 2024, and more than 39,000 suspected honeypots deployed globally. From protocol fingerprinting to cloud-hosted traps like GridPot, we explore what’s real, what’s fake, and why it matters for national infrastructure.

If you're in cybersecurity, critical infrastructure, or just curious how close we are to a digital blackout, don’t miss this briefing.

Topics

ICS securityexposed ICSindustrial control systemscritical infrastructureICS honeypotscyber threatsSCADAMODBUSTTL analysisfuzzy testingGridPotICSvertaseICS vulnerabilitiescloud honeypotshoneypot detectioncybersecurity researchShodanICS protocolsnetwork securitydigitalization of infrastructurethreat intelligencecyber-physical systemsOT securitycloud ICSreal vs fake ICSICS attack surfaceICS scanning toolscybersecurity podcastinfrastructure protectionICS device exposure