Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks. As the number of threats and the financial impact of breaches increase, these frameworks are even more crucial. Consider ransomware. Since 2020, more than 130 different strains of these encryption and extortion efforts have […]

The post Now You SIEM, Now You Don’t —Six Failures of Cybersecurity appeared first on Security Intelligence.

Continue reading Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

Researcher Says Google Paid $100k Bug Bounty for Smart Speaker Vulnerabilities

Security researcher Matt Kunze says Google paid him a $107,500 bug bounty reward for responsibly reporting vulnerabilities in the Google Home Mini smart speaker.
The issues, the researcher says, could have been exploited by an attacker within wireless … Continue reading Researcher Says Google Paid $100k Bug Bounty for Smart Speaker Vulnerabilities

How Can the White House’s New IoT Labels Improve Security?

The White House’s National Security Council (NSC) is working on an ambitious project to improve consumer Internet of Things (IoT) security through industry-standard labeling. If successful, the labeling system will replace existing frameworks across the globe. Modeled after the EPA’s Energy Star labeling program, the IoT labeling initiative should have two effects: to educate and […]

The post How Can the White House’s New IoT Labels Improve Security? appeared first on Security Intelligence.

Continue reading How Can the White House’s New IoT Labels Improve Security?

Study: Consumer security savvy is way behind IoT threat landscape

A new Comcast study hints at a major risk to businesses, governments and public systems due to poor cybersecurity in the booming Internet of Things industry.
The post Study: Consumer security savvy is way behind IoT threat landscape appeared first on T… Continue reading Study: Consumer security savvy is way behind IoT threat landscape

Device Exploits Earn Hackers Nearly $1 Million at Pwn2Own Toronto 2022

The Zero Day Initiative’s Pwn2Own Toronto 2022 hacking contest has come to an end, with participants earning nearly $1 million for exploits targeting smartphones, printers, routers, NAS devices, and smart speakers.
read more Continue reading Device Exploits Earn Hackers Nearly $1 Million at Pwn2Own Toronto 2022