New Report: Ransomware, Vulnerabilities and IoT Security Threats

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.
The post New Report: Ransomware, Vulnerabilities and IoT… Continue reading New Report: Ransomware, Vulnerabilities and IoT Security Threats

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the attack – and helped them contain an… Continue reading Defending Against IoT Security Camera Hacks Like Verkada

New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

Nozomi Networks Labs has discovered vulnerabilities in the Peer-to-Peer (P2P) feature of a commonly used line of security cameras – Reolink. P2P is used by several vendors and, if your CCTV camera has this feature, it’s important to understand the pote… Continue reading New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

New Threat Intelligence Reveals Misuse of DNS Protocol

Nozomi Networks Labs has uncovered new misuse of the DNS protocol that opens the door to significant threats in the future. We urge security teams to familiarize themselves with this new threat intelligence and centrally monitor their systems for probl… Continue reading New Threat Intelligence Reveals Misuse of DNS Protocol

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them.
The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Net… Continue reading Overcoming the Challenges of Detecting P2P Botnets on Your Network

Video: TryHackMe – Behind the Curtain

Watch Now for Your Very Own Backstage Pass!
Video and Slide Deck from EH-Net Live! Aug 2020
With the growing need for security professionals, a huge number of people are flooding the job market from a diverse range of experience and backgrounds. And le… Continue reading Video: TryHackMe – Behind the Curtain

Webinar: TryHackMe – Behind the Curtain

Register Now for Your Very Own Backstage Pass!
With the growing need for security professionals, a huge number of people are flooding the job market from a diverse range of experience and backgrounds. And let’s be honest… Hacking is just plain fun! W… Continue reading Webinar: TryHackMe – Behind the Curtain

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library.
The post Ripple20 – Ne… Continue reading Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT