The OPC unified architecture is growing in popularity as a platform-independent industrial communications architecture for connecting industrial systems to IT and the cloud. However, a chain of customizations and complexities in OPC-UA implementations has generated vulnerabilities in the software supply chain. Eran Jacob from Otorio describes the findings in the Black Hat session “A Broken Chain: Discovering OPC UA Attack Surface and Exploiting the Supply Chain” in the session. The session is called A Broken Chain.”]
Source: https://www.darkreading.com/application-security/exploiting-the-industry-4-0-supply-chain

