Critical ICS vulnerabilities can be exploited through leading cloud-management platforms.
Source: Threadpost