Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library.
The post Ripple20 – Ne… Continue reading Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

The Remote Access Genie is Out of the Bottle – Protect Your OT Systems

CISOs are facing a big dilemma: keeping OT systems running 24/7 when employees are working from home and dependent on secure connectivity to function normally. Learn more.
The post The Remote Access Genie is Out of the Bottle – Protect Your OT Sy… Continue reading The Remote Access Genie is Out of the Bottle – Protect Your OT Systems

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19.
Nozomi Networks Labs examines how network traffic analysis can detect this specific threat.
The post COVID-19 C… Continue reading COVID-19 Chinoxy Backdoor: A Network Perspective

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and orchestrate new cyberattacks.
The post OT/IoT Security Sup… Continue reading OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and orchestrate new cyberattacks.
The post COVID-19 (coronavir… Continue reading COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm

What are the key findings of the Newsweek survey on the cybersecurity risks of cyber-physical systems for critical infrastructure organizations?
The post Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm appeared first on Nozomi Network… Continue reading Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm

New Anomaly Detection Accelerates OT and IoT Security

Security teams can’t completely defend systems against sophisticated cyberattacks, but visibility into these threats helps minimize security risks.
The post New Anomaly Detection Accelerates OT and IoT Security appeared first on Nozomi Networks…. Continue reading New Anomaly Detection Accelerates OT and IoT Security

Industrial Cybersecurity Needs Broad & Deep OT/IoT Threat Visibility

Security teams can’t completely defend systems against sophisticated cyberattacks, but visibility into these threats helps minimize security risks.
The post Industrial Cybersecurity Needs Broad & Deep OT/IoT Threat Visibility appeared first … Continue reading Industrial Cybersecurity Needs Broad & Deep OT/IoT Threat Visibility

Industrial Operators on Alert in Wake of U.S. Cyberattack Warning

On January 4th, the U.S. Department of Homeland Security (DHS) issued a National Terrorism Advisory bulletin warning of a potential cyberattack by Iran in the wake of a U.S. drone attack that killed a senior Iranian military commander.
Read Nozomi Netw… Continue reading Industrial Operators on Alert in Wake of U.S. Cyberattack Warning

Deep IBM Collaboration Delivers Unified IT and OT Cyber Security

Senior executives at industrial and OT organizations increasingly need to understand the full scope of their cyber risks. However, their confidence with current monitoring for OT/IoT systems is typically low.
To help tackle this challenge, IBM and Nozo… Continue reading Deep IBM Collaboration Delivers Unified IT and OT Cyber Security