New Report: Ransomware, Vulnerabilities and IoT Security Threats

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats.
The post New Report: Ransomware, Vulnerabilities and IoT… Continue reading New Report: Ransomware, Vulnerabilities and IoT Security Threats

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the attack – and helped them contain an… Continue reading Defending Against IoT Security Camera Hacks Like Verkada

New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

Nozomi Networks Labs has discovered vulnerabilities in the Peer-to-Peer (P2P) feature of a commonly used line of security cameras – Reolink. P2P is used by several vendors and, if your CCTV camera has this feature, it’s important to understand the pote… Continue reading New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

New Threat Intelligence Reveals Misuse of DNS Protocol

Nozomi Networks Labs has uncovered new misuse of the DNS protocol that opens the door to significant threats in the future. We urge security teams to familiarize themselves with this new threat intelligence and centrally monitor their systems for probl… Continue reading New Threat Intelligence Reveals Misuse of DNS Protocol

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them.
The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Net… Continue reading Overcoming the Challenges of Detecting P2P Botnets on Your Network

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library.
The post Ripple20 – Ne… Continue reading Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations.
The post IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses appeared first on … Continue reading IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19.
Nozomi Networks Labs examines how network traffic analysis can detect this specific threat.
The post COVID-19 C… Continue reading COVID-19 Chinoxy Backdoor: A Network Perspective