Why Fight Uphill? Level the Playing Field with SaaS OT Security.

Rather than fighting back post-breach, it’s more effective to level the playing field pre-breach. SaaS OT security is uniquely able to do that.
The post Why Fight Uphill? Level the Playing Field with SaaS OT Security. appeared first on Nozomi Networks…. Continue reading Why Fight Uphill? Level the Playing Field with SaaS OT Security.

PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts).
The post PrintNightmare: … Continue reading PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts).
The post PrintNightmare: … Continue reading PrintNightmare: How To Check If Your Systems Are Still Vulnerable

New Report: Ransomware, Vulnerabilities and IoT Security Threats

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.
The post New Report: Ransomware, Vulnerabilities and IoT… Continue reading New Report: Ransomware, Vulnerabilities and IoT Security Threats

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

Responding to the Colonial Pipeline Breach & CISA Ransomware Alert

The recent DarkSide ransomware attack on Colonial Pipeline, a critical infrastructure supplier of about 45% of the United States’ east coast gasoline, diesel and jet fuel, infected the company’s IT network. Learn about the threat posed by ransomware an… Continue reading Responding to the Colonial Pipeline Breach & CISA Ransomware Alert

OT and IoT Security: Adopt a Post-Breach Mindset Today

Every time there’s a cyberattack like the recent ransomware targeting Colonial Pipeline, industry experts scramble to share thoughts on what could have been done to thwart it, or what the impact of a breach could be. Organizations need to reset themsel… Continue reading OT and IoT Security: Adopt a Post-Breach Mindset Today

7 Types of Phishing: How to Recognize Them & Stay Off the Hook

Phishing is today’s most dangerous cyberattack. Google noted a more than 600% spike in phishing attacks in 2020 compared to 2019 with a total of 2,145,013 phishing sites registered as of January 17, 2021, up from 1,690,000 on Jan 19, 2020. It is … Continue reading 7 Types of Phishing: How to Recognize Them & Stay Off the Hook