Trickbot uses compromised MikroTik routers as C2 communication proxies

MikroTik routers are getting compromised to serve as communication proxies for Trickbot malware, to enable Trickbot-affected devices to communicate with their their C2 server in a way that standard network defense systems won’t detect, Microsoft … Continue reading Trickbot uses compromised MikroTik routers as C2 communication proxies

Healthcare cybersecurity trends: Organizations not quite ready to deal with threats

Protected Harbor announced the launch of its latest whitepaper on healthcare cybersecurity which offers readers an insight into evolving healthcare data breach patterns, predictive threats for 2022, and a playbook on how to increase IT durability to st… Continue reading Healthcare cybersecurity trends: Organizations not quite ready to deal with threats

Digital transformation market to reach $1,759.4 billion by 2028

The global digital transformation market size is estimated to reach $1,759.4 billion by 2028, registering a CAGR of 23.6% over the forecast period, according to Grand View Research. The increasing adoption of advanced technologies, such as the Internet… Continue reading Digital transformation market to reach $1,759.4 billion by 2028

Using Radar to Read Body Language

Yet another method of surveillance:

Radar can detect you moving closer to a computer and entering its personal space. This might mean the computer can then choose to perform certain actions, like booting up the screen without requiring you to press a button. This kind of interaction already exists in current Google Nest smart displays, though instead of radar, Google employs ultrasonic sound waves to measure a person’s distance from the device. When a Nest Hub notices you’re moving closer, it highlights current reminders, calendar events, or other important notifications…

Continue reading Using Radar to Read Body Language

5 steps that simplify IoT security for OEMs

As digital transformation materializes, businesses are becoming more reliant on devices that support valuable IoT services. As the reliance on these devices grows, so does the number of cyberattacks on connected solutions. Each breach not only impacts … Continue reading 5 steps that simplify IoT security for OEMs

Get ready for security in the age of the Extended Internet of Things, says Claroty

ICS vulnerability disclosures have grown by 110% since 2018, which Claroty said suggests more types of operational technologies are coming online and presenting soft targets.
The post Get ready for security in the age of the Extended Internet of Things… Continue reading Get ready for security in the age of the Extended Internet of Things, says Claroty

IoT security is foundational, not optional

A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the historic lag between the rate of digital transformation and the speed of securing … Continue reading IoT security is foundational, not optional