PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts).
The post PrintNightmare: … Continue reading PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts).
The post PrintNightmare: … Continue reading PrintNightmare: How To Check If Your Systems Are Still Vulnerable

New Report: Ransomware, Vulnerabilities and IoT Security Threats

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.
The post New Report: Ransomware, Vulnerabilities and IoT… Continue reading New Report: Ransomware, Vulnerabilities and IoT Security Threats

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the attack – and helped them contain an… Continue reading Defending Against IoT Security Camera Hacks Like Verkada

New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

Nozomi Networks Labs has discovered vulnerabilities in the Peer-to-Peer (P2P) feature of a commonly used line of security cameras – Reolink. P2P is used by several vendors and, if your CCTV camera has this feature, it’s important to understand the pote… Continue reading New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

New Threat Intelligence Reveals Misuse of DNS Protocol

Nozomi Networks Labs has uncovered new misuse of the DNS protocol that opens the door to significant threats in the future. We urge security teams to familiarize themselves with this new threat intelligence and centrally monitor their systems for probl… Continue reading New Threat Intelligence Reveals Misuse of DNS Protocol

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them.
The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Net… Continue reading Overcoming the Challenges of Detecting P2P Botnets on Your Network

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations.
The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networ… Continue reading What IT Needs to Know about OT/IoT Security Threats in 2020