Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies

The Colonial Pipeline is critical infrastructure—of that there’s no doubt. But ransomware scrotes have crippled it.
The post Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies appeared first on Security Boulevard.
Continue reading Colonial Pipeline FAIL: Ransomware Gang Threatens Gas Supplies

Will Full Autonomy Ever Be Realized?

Matt Novak of Gizmodo posted an article on April 30, 2021 with the title “Elon Musk Shares Painfully Obvious Idea About the Difficulty of Self-Driving Cars,” available at Elon Musk Shares Painfully Obvious Idea About the Difficulty of Self-Driving Cars… Continue reading Will Full Autonomy Ever Be Realized?

NAME:WRECK DNS Bugs: What You Need to Know

For most internet users, there’s not much of a perceivable difference between the domain name they want to visit and the server that the domain queries. That’s because the Domain Name System (DNS) protocol does a good job of seamlessly routing users to… Continue reading NAME:WRECK DNS Bugs: What You Need to Know

Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability

A high-severity bug affects almost 40% of Android phones. The security hole is in Qualcomm modems.
The post Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability appeared first on Security Boulevard.
Continue reading Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability

How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is getting a lot of attention for its greenfield deployment of the nation… Continue reading How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

What’s Next for Connected Devices in Health Care?

According to a Deloitte study, approximately 68% of medical devices will be either connected or connectable to a health system network by 2025. Each of those devices simultaneously represents an opportunity for health care providers to transform the d… Continue reading What’s Next for Connected Devices in Health Care?

U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

175 million IP addresses owned by the U.S. Defense Department have “appeared” on the public internet.
The post U.S. DoD has World’s Largest Honeypot: 6% of Internet Space appeared first on Security Boulevard.
Continue reading U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

Industrial Security: Not Just IT and OT, but Old OT and New OT

Lane Thames, PhD and principal security researcher at Tripwire explains the challenges you might not have considered in IT/OT convergence. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripw… Continue reading Industrial Security: Not Just IT and OT, but Old OT and New OT

The Aggregation Model is Falling Short

The following is an excerpt from our recent whitepaper, “Why Traditional Cybersecurity Tools Cannot Defend Against Zero-Day and No Signature Attacks,” in which we dive into how traditional cybersecurity tools work, why this fundamentally limits them fr… Continue reading The Aggregation Model is Falling Short

Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons

The government of the United Kingdom is investigating the proposed “merger” of ARM and Nvidia, on national security grounds.
The post Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons appeared first on Security Boulevard.
Continue reading Wait, What? Nvidia/ARM Sale on Hold—for Security Reasons