Alleged Verkada hacker says police raided their home in Switzerland

One of the hackers who claimed responsibility for breaking into the networks of camera surveillance firm Verkada says police have raided their home in Switzerland. Tillie Kottman said in a social media post that the raid occurred Friday morning in the Swiss city of Lucerne and resulted in the confiscation of their electronic devices. Kottman has claimed to be part of a group of hackers the broke into the networks of Silicon Valley-based Verkada, and reportedly accessed live feeds of 150,00 cameras in hospitals, prisons and other organizations. The raid was part of a criminal case against Kottmann that U.S. prosecutors are pursuing out of the Western District of Washington, according to Bloomberg News, which was first to report on the raid. Kottmann is accused of identity theft, fraud and breaking into protect computers, Bloomberg reported. A Justice Department spokesperson did not respond for a request for comment on Friday. Police […]

The post Alleged Verkada hacker says police raided their home in Switzerland appeared first on CyberScoop.

Continue reading Alleged Verkada hacker says police raided their home in Switzerland

Manufacturing Cybersecurity Threats and How To Face Them

With manufacturing cybersecurity threats on the rise, what should companies know about protecting their digital assets in the future?  Risks to Security in Manufacturing The number of ransomware incidents involving the manufacturing sector increased 156% between the first quarters of 2019 and 2020. Later in 2020, ransomware actors demanded $17 million from a laptop maker […]

The post Manufacturing Cybersecurity Threats and How To Face Them appeared first on Security Intelligence.

Continue reading Manufacturing Cybersecurity Threats and How To Face Them

Overcoming IoT Asset Management Challenges

The ability to track anything — from the level of coffee left in your pot to a real-time inventory of goods in a warehouse — is compelling in any industry. With the number of IoT devices expected to reach 55.7 billion worldwide by 2025, security teams… Continue reading Overcoming IoT Asset Management Challenges

Firewall Services and More: What’s Next for IT?

Firewall services, cloud network protection tools and other IT defense staples are seeing a lot of changes in 2021. IT landscapes are growing more complex, as are the defense systems that protect them. Remote work is common, and more work is moving to the cloud. Companies of all sizes will be looking to streamline digital defense. What […]

The post Firewall Services and More: What’s Next for IT? appeared first on Security Intelligence.

Continue reading Firewall Services and More: What’s Next for IT?

Geeni smart doorbells, cameras riddled with flaws, research finds

Walmart and Amazon are continuing to sell faulty smart doorbells and cameras filled with vulnerabilities that could expose customers’ sensitive information, according to research published Thursday. The vulnerabilities, found in Geeni- and Merkury-branded security cameras and smart doorbells, would allow attackers to take full control of devices and remotely disable cameras through a denial of service attack in some cases, according to the research. In others, the flaws could allow for the the disclosure of sensitive information and unauthenticated access. Some other exploits would allow attackers to gain remote access to a stream of one of the affected doorbell cameras. The flaws variously affect Merkury/Geeni doorbell models GNC-CW013, GNC-CW025 and MI-CW024 and camera models GNC-CW003, GNC-CW010, GNC-CW028 and MI-CW017, according to the research. Merkury is Geeni’s parent company. Security cameras and doorbells that connect to the internet have been plagued by flaws for years. Just last month a TechCrunch investigation […]

The post Geeni smart doorbells, cameras riddled with flaws, research finds appeared first on CyberScoop.

Continue reading Geeni smart doorbells, cameras riddled with flaws, research finds

Congress is starting to move on more cyber bills, even if few become law

Congress dramatically ratcheted up the number of cybersecurity bills introduced in the last two years compared to the prior session of Congress, but that didn’t equate to much more of it becoming law, according to a think tank study out today. And while cybersecurity legislation remained a relative oasis of bipartisanship, that tendency sharply dropped off when it came to election security, found the tally from Third Way — which CyberScoop is first reporting. The findings offer potential insights into how the issue is evolving, and where it might go next, even if the trends don’t lend themselves to a simple explanation. In all, lawmakers introduced 316 cybersecurity bills in the 116th Congress that ran from 2019 to 2020, a 40% increase from the 115th Congress. That continues a trend that took off in that session of Congress: The 114th Congress saw just 22 cybersecurity measures offered, the center-left think […]

The post Congress is starting to move on more cyber bills, even if few become law appeared first on CyberScoop.

Continue reading Congress is starting to move on more cyber bills, even if few become law

For Attackers, Home is Where the Hideout Is

Remember the good ol’ days of playing hide-and-seek? It’s hard to forget the rush of finding the perfect hiding place. I remember crouching into a tiny ball behind the clothes hanging in my mother’s closet, or standing frozen like a statue behind the curtain of our living room window. While it was “just a game” […]

The post For Attackers, Home is Where the Hideout Is appeared first on Security Intelligence.

Continue reading For Attackers, Home is Where the Hideout Is

5 IoT Threats To Look Out for in 2021

As we bring 2020 to a close, it’s time to look at 2021 and a new chapter in the book of cybersecurity. While there are no doubt a multitude of possible attacks, here are six types of attacks that are becoming more popular and more common among attackers using Internet of things (IoT) threats. 1. […]

The post 5 IoT Threats To Look Out for in 2021 appeared first on Security Intelligence.

Continue reading 5 IoT Threats To Look Out for in 2021

7 Cybersecurity Tools On Our Holiday Wish List

The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing in their heads. Instead, they dream of cybersecurity tools and other resources to help them cope with a wild threat landscape.  Here’s our ultimate holiday wish list.  […]

The post 7 Cybersecurity Tools On Our Holiday Wish List appeared first on Security Intelligence.

Continue reading 7 Cybersecurity Tools On Our Holiday Wish List

33 connectivity flaws render millions of IT, IoT devices vulnerable

Several sets of internet communication protocols used by major vendors of connected products have vulnerabilities that could affect millions of devices, researchers revealed on Tuesday. Four of the vulnerabilities are critical, meaning attackers could use them to remotely take over devices ranging from a “smart” refrigerator to an industrial networking switch in the electrical grid, according to the security vendor Forescout. The flaws exist in information technology, operational technology and so-called internet of things products. The Forescout study, dubbed AMNESIA:33, focuses on 33 vulnerabilities in four open-source TCP/IP stacks. TCP/IP stands for “Transmission Control Protocol/Internet Protocol,” which is used to communicate between computers. Open-source TCP/IP stacks serve as the foundational connectivity components of devices around the world. (A TCP/IP stack is an implementation of the TCP/IP protocol.) It marks the second time this year that a set of TCP/IP stack vulnerabilities emerged that could affect a large number of devices. […]

The post 33 connectivity flaws render millions of IT, IoT devices vulnerable appeared first on CyberScoop.

Continue reading 33 connectivity flaws render millions of IT, IoT devices vulnerable