Behind the Scenes – Teaching “Secure Wi-Fi Design Special Edition” at WLPC Phoenix

Converting my Secure Wi-Fi Design course to a hands-on lab experience was no small feat. I’m grateful for the opportunity and invite you behind the scenes at my WLPC Deep Dive. Continue reading Behind the Scenes – Teaching “Secure Wi-Fi Design Special Edition” at WLPC Phoenix

How and Why to Upgrade to the Latest Wi-Fi Security [Video]

At the WLPC Conference in Phoenix a few weeks ago, I gave a short 30-minute talk on how and why to upgrade to WPA3 Security for business networks. Click the image in the blog header to watch the video. In this (accidentally) slide-free session, I cover… Continue reading How and Why to Upgrade to the Latest Wi-Fi Security [Video]

InHand Industrial Router Vulnerabilities Expose Internal OT Networks to Attacks

A series of vulnerabilities affecting industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to internal operational technology (OT) networks from the internet.
read more Continue reading InHand Industrial Router Vulnerabilities Expose Internal OT Networks to Attacks

FCC Proposes Tighter Data Breach Reporting Rules for Wireless Carriers

The Federal Communications Commission (FCC) is proposing tighter rules on the reporting of data breaches by wireless carriers.
The updated rules, the FCC says, will fall in line with recent changes in federal and state laws regarding data breaches in o… Continue reading FCC Proposes Tighter Data Breach Reporting Rules for Wireless Carriers

US Government Agencies Issue Guidance on Threats to 5G Network Slicing

The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) have released guidance on the security risks associated with 5G network slicing and mitigati… Continue reading US Government Agencies Issue Guidance on Threats to 5G Network Slicing

LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems

Mordechai Guri, a cybersecurity researcher from the Ben-Gurion University of the Negev in Israel who specializes in air gap jumping, has released a paper detailing yet another method that can be used to stealthily exfiltrate data from systems isolated … Continue reading LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems

Proofpoint: Watch Out for Nighthawk Hacking Tool Abuse

Security researchers at Proofpoint are calling attention to the discovery of a commercial red-teaming tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors.
read more Continue reading Proofpoint: Watch Out for Nighthawk Hacking Tool Abuse