Hackers can infect network-connected wrenches to install ransomware | Researchers identify 23 vulnerabilities, some of which can exploited with no authentication::Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.
This really isn’t shocking news. Tons of industrial devices have poor or out of date security. This is why you always segment off your Operational Technology on your network.