ICS are particularly vulnerable because they often rely on legacy systems, lack strong authentication, and cannot tolerate downtime, the study says. To address these weaknesses, the researchers ...