Security Experts:

long dotted


A researcher has found a new way to hack and steal Teslas, via a Bluetooth-based relay attack that abuses a key card feature. [Read More]
Access control products from LenelS2 and other vendors using HID Mercury controllers are affected by vulnerabilities that can allow hackers to remotely unlock doors. [Read More]
Tracked as CVE-2022-31460, the vulnerability allows attackers to turn the video conferencing devices into rogue access points. [Read More]
Tracked as CVE-2022-31460, the Meeting Owl Pro and Whiteboard Owl vulnerability allows an attacker to turn a vulnerable device into a rogue access point. [Read More]
Security researchers warn of two vulnerabilities in U-Boot that could be exploited from the local network to write arbitrary data or cause a denial-of-service condition. [Read More]
Ordr raises $40 million in a Series C funding round co-led by Battery Ventures and Ten Eleven Ventures. [Read More]
Forescout has published a proof of concept for a ‘ransomware’ attack that uses IoT for access, IT for traversal, and OT (especially PLCs) for detonation. It is called R4IoT and is described as the next generation of ransomware. [Read More]
Several critical and high-severity vulnerabilities have been found in the Open Automation Software Platform, used for connectivity between ICS, databases and apps. [Read More]
Over $1.15 million was awarded at Pwn2Own Vancouver 2022 for exploits targeting Tesla Model 3, Windows 11, Ubuntu, Microsoft Teams, Safari, Firefox and Oracle VirtualBox. [Read More]
Researchers looked at what a hacker with physical access can do with Konica Minolta printers — the answer: a lot. [Read More]


rss icon

Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Marie Hattar's picture
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Marie Hattar's picture
There is a pressing need tighten IoT security, especially in an insecure world where these unmanaged devices are playing a rapidly-growing and increasingly important role
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.