Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the attack – and helped them contain an… Continue reading Defending Against IoT Security Camera Hacks Like Verkada

New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

Nozomi Networks Labs has discovered vulnerabilities in the Peer-to-Peer (P2P) feature of a commonly used line of security cameras – Reolink. P2P is used by several vendors and, if your CCTV camera has this feature, it’s important to understand the pote… Continue reading New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

New Threat Intelligence Reveals Misuse of DNS Protocol

Nozomi Networks Labs has uncovered new misuse of the DNS protocol that opens the door to significant threats in the future. We urge security teams to familiarize themselves with this new threat intelligence and centrally monitor their systems for probl… Continue reading New Threat Intelligence Reveals Misuse of DNS Protocol

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them.
The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Net… Continue reading Overcoming the Challenges of Detecting P2P Botnets on Your Network

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations.
The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networ… Continue reading What IT Needs to Know about OT/IoT Security Threats in 2020

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library.
The post Ripple20 – Ne… Continue reading Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19.
Nozomi Networks Labs examines how network traffic analysis can detect this specific threat.
The post COVID-19 C… Continue reading COVID-19 Chinoxy Backdoor: A Network Perspective

Black Hat: The Future of Securing Power Grid Intelligent Devices

Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs).
Using the IEC 62351 standard for monitoring industrial networks, we demonstrate h… Continue reading Black Hat: The Future of Securing Power Grid Intelligent Devices

Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro

It was reported today that Norsk Hydro has temporarily stopped aluminum production at several plants following an attack by the ransomware known as LockerGoga.
Nozomi Networks Labs has conducted a preliminary evaluation of LockerGoga. Read on to learn … Continue reading Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro