[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fuXBlJUSJ701okjVjA4Jr9KMuTmu2PDWSDqCmCZ0q4Ik":3},{"article":4,"iocs":43},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":23,"category":24,"article_tags":27},"e63d37eb-3dca-4c83-be6e-4602a928f5a1","Taiwan Incident Highlights Cybersecurity Gaps in Rail Systems","taiwan-incident-highlights-cybersecurity-gaps-in-rail-systems-9384b9","A Taiwanese student experimenting with software-defined radio technology shut down three bullet trains for nearly an hour, leading to an anti-terrorism response.","A Taiwanese student experimenting with software-defined radio (SDR) technology managed to shut down three bullet trains for approximately one hour, exposing critical cybersecurity vulnerabilities in the nation's rail infrastructure. The incident triggered an anti-terrorism response from authorities. The breach highlights systemic security gaps in critical infrastructure systems that rely on legacy and inadequately protected communications protocols.","Taiwanese student halts three bullet trains for ~1 hour using software-defined radio, triggering anti-terrorism",null,"https:\u002F\u002Fwww.darkreading.com\u002Fics-ot-security\u002Ftaiwan-incident-highlights-cybersecurity-gaps","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fbltba3a137dbf767ae6\u002F6a061f2f41bd583c0c8882d7\u002Ftaiwan-bullet-trains-eric1207cvb-shutterstock.jpg?width=1280&auto=webp&quality=80&disable=upscale","2026-05-15T01:00:00+00:00","2026-05-15T02:00:14.912762+00:00",7,[18,21],{"name":19,"type":20},"Software-Defined Radio (SDR)","technology",{"name":22,"type":20},"Rail signaling systems","d6f63bb8-0801-486a-be7f-171400700454",{"id":23,"icon":11,"name":25,"slug":26},"IoT\u002FOT","iot-ot",[28,33,38],{"category":29},{"id":30,"icon":11,"name":31,"slug":32},"c5c77cdb-f7d7-4990-9436-c81dcbff1163","Policy","policy",{"category":34},{"id":35,"icon":11,"name":36,"slug":37},"c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73","Incident Response","incident-response",{"category":39},{"id":40,"icon":11,"name":41,"slug":42},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]