Industrial cybersecurity solutions provider Nozomi Networks on Tuesday announced the formal launch of the company’s research department, Nozomi Networks Labs.
While this is the formal launch of its research department, Nozomi has already conducted detailed analysis of some major threats targeting industrial control systems (ICS), including the GreyEnergy and Triton/Trisis malware families. The company has also created and released some tools that may be useful to defenders.
In the past year, Nozomi says it has also identified and reported over a dozen vulnerabilities affecting ICS products, including flaws that can lead to safety incidents or disruptions to production.
With the official launch of Nozomi Networks Labs, the company plans on dedicating even more resources to research efforts and also draw on the expertise of the broader cybersecurity community, including staff working for its customers, ICS threat intelligence and data analytics partners, universities, and individual researchers who might be interested in collaborations.
“Research, community collaboration and giving back have always been part of Nozomi Networks’ DNA,” said Andrea Carcano, co-founder and chief product officer of Nozomi. “Nozomi Networks Labs will allow us to make an even greater contribution to the ICS cyber security community.”
Learn More About ICS Research at SecurityWeek’s 2019 ICS Cyber Security Conference
Nozomi also announced on Tuesday that it has made some contributions to the open source fuzzing tool Radamsa in an effort to make it easier and faster to discover vulnerabilities in PLCs, RTUs and other devices that communicate over industrial networks.
Radamsa, developed by Aki Helin of Finland’s University of Oulu, is a general-purpose fuzzing tool designed for uncovering security flaws without too much human input. Nozomi says it has been using the tool since the company was founded and it recently submitted some changes that make it more efficient for industrial systems.
“Our enhancement tests the robustness of protocol stacks,” explained Moreno Carullo, co-founder and CTO of Nozomi. “This is an area where PLC, RTU and, in general, OT-device software, needs more focus. Higher quality is required to help prevent zero-day vulnerabilities and other security issues.”
Related: Schneider Electric Teams With Nozomi on Critical Infrastructure Security
Related: Fuzzing Tests Show ICS Protocols Least Mature
Related: Many Vulnerabilities Found in OPC UA Industrial Protocol

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
- Cybercriminals, APT Exploited Telerik Vulnerability in Attacks on US Government Agency
- US Charges Two Men Over Use of Hacked Law Enforcement Database for Doxing
Latest News
- Ferrari Says Ransomware Attack Exposed Customer Data
- Aembit Scores $16.6M Seed Funding for Workload IAM Technology
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
