ICS/OT
A researcher has used a free tool that he created and open source intelligence (OSINT) to demonstrate how easy it is for adversaries to...
Hi, what are you looking for?
The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.
A researcher has used a free tool that he created and open source intelligence (OSINT) to demonstrate how easy it is for adversaries to...
IoT security firm Armis has confirmed that the recently disclosed vulnerabilities tracked as Urgent/11 affect several real time operating systems (RTOS) other than VxWorks.
The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) informed organizations last week that Tridium’s Niagara product is affected by two...
A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the...
Honeywell on Wednesday announced the launch of a new industrial cybersecurity platform designed to help organizations protect their operational technology (OT) and industrial internet...
D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited remotely to take complete control of a...
Researchers have discovered many vulnerabilities in over a dozen small office/home office (SOHO) routers and network-attached storage (NAS) devices as part of a project...
The attack traffic recorded by F-Secure's global network of honeypots tripled from the last six months of 2018 to the first six months of...
Palo Alto Networks on Wednesday announced the acquisition of IoT security firm Zingbox for $75 million in cash, and made public its financial results...
Two United States senators have sent a letter to the National Highway Traffic Safety Administration (NHTSA) to inquire about cyber-risks associated with connected vehicles.
Cisco has released a new hardware tool designed to help researchers, developers and automakers discover vulnerabilities in automobile computers.
Make Sure You Understand the Root Cause of the Vulnerabilities or Attack Vectors Behind the Next Over-Hyped Stunt HackEvery year, at least one mediocre...
Researchers at cybersecurity firm Check Point have demonstrated that malicious actors could hack a DSLR camera and infect it with a piece of ransomware.
The growth of IoT devices has highlighted the difficulties in ensuring firmware security -- especially where the device and software are initially sourced from...
Researchers from security firm IOActive have discovered a series of vulnerabilities and attacks that they believe could be possible on Boeing's 787 Dreamliner.
IoT Devices Used as Points of Ingress for Hackers to Establish a Presence on Corporate Network
Several major industrial and automation solutions providers have issued advisories in response to the recently disclosed Wind River VxWorks vulnerabilities dubbed Urgent/11.
Attack on Connected Cars Could Could Kill Thousands, Advocacy Group Claims
Less than a fifth of professionals who responded to a recent poll say they are very confident in their ability to secure Internet of Things...
A recently discovered variant of the Mirai Internet of Things (IoT) malware is using a command and control (C&C) server on the Tor network,...