Product case study Securing Industry 4.0 R&D: The RIS and EDI Institute Case Study The Robot Immune System (RIS) protects the robots during advanced R&D activities at EDI Latvia. Machine Learning approaches in robots are now secured thanks to the Robot Immune System.
Product case study Securing Advanced Robotics Research: The RIS and JOANNEUM RESEARCH Case Study The Robot Immune System (RIS) protects the robots during advanced R&D activities at Joanneum Research. Machine Learning approaches in robots are now secured thanks to the Robot Immune System.
Product case study Securing Robotic R&D Environments: The RIS and Vicomtech Case Study The Robot Immune System (RIS) protects the robots during advanced R&D activities at Vicomtech, a leading RTO providing solutions to industrial customers in the European landscape.
Product case study Securing Collaborative Robots in Manufacturing: The RIS and RPK Case Study The Robot Immune System (RIS) protects the robots of RPK, a manufacturer of industrial-grade springs serving automotive, electric or medical industries, among others.
Product case study Securing Robot Endpoints in OT Environments: The RIS and KICS Case Study The Robot Immune System (RIS) and Kaspersky Industrial CyberSecurity (KICS) join forces to protect robot endpoints in OT environments, ensuring safety and cybersecurity compliance.
Product case study Robotic Traceability and Forensics: A Black Box Case Study A traceability analysis connecting BlackBox to a UR robot, in which all information is registered and recorded. BlackBox provides industrial-grade forensics and secure data recording for robots.
Services case studies Red Teaming ROS-Industrial: Advanced Security Assessment for Industrial Robotics A red teaming report using the ROS-Industrial platform. Analyzing whether ROS can be used securely for industrial use cases through a targeted offensive security exercise.
Services case studies Penetration Testing MiR: Security Analysis of Mobile Industrial Robots A penetration testing case study on the collaborative robots of Mobile Industrial Robots. More than 100 security flaws found in MiR AMRs used in healthcare and industry.
Services case studies Penetration Testing Universal Robots: A Security Analysis of Cobots A penetration testing case study on the collaborative robots of Universal Robots. More than 80 vulnerabilities found across UR3, UR5 and UR10 firmware versions.
Services case studies Penetration Testing DJI Drones: A Comprehensive Security Analysis Penetration testing DJI drones - cybersecurity case study. More than 130 security flaws found in DJI Mavic Pro aerial robots.
Services case studies Penetration Testing KUKA Industrial Robots: A Security Analysis A penetration testing case study on KUKA industrial robots. Vulnerabilities found in KUKA KR C4 robot controller disclosed in cooperation with BSI and INCIBE.
Services case studies Penetration Testing ABB Industrial Robots: Comprehensive Security Analysis A penetration testing case study on ABB industrial robots. About 25 security flaws identified on ABB IRC5 Compact robot controller with IRB140 Manipulator.
Services case studies Threat Modeling the MARA Robot: A Native ROS 2 Security Case Study A security threat model case study of a collaborative modular robot with ROS 2 performing a pick and place activity. STRIDE and DREAD methodologies applied.
Services case studies Penetration Testing the xArm: Security Analysis of a Low-Cost Cobot A penetration testing case study on a low cost collaborative robot. Multiple critical security flaws found in UFactory xArm family of robots.
Services case studies Penetration Testing Humanoid Social Robots: SoftBank Robotics Case Study A penetration testing case study on the Pepper and NAO humanoid robots of Softbank Robotics. Security threats identified in social robots used in healthcare and service environments.
Services case studies Pentesting the Ryze Tello Drone: Security Analysis and Vulnerabilities Penetration testing Ryze Tello drone cybersecurity case study. Missing authentication vulnerability allows trivial drone hijacking.