Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers estimate that as many as a million IoT devices could be exposed to remote hacker attacks due to serious vulnerabilities found in Realtek SDKs. [Read More]
A few days after disclosure, botnet operators started exploiting a vulnerability that affects routers and modems from over a dozen vendors due to shared firmware. [Read More]
The connected device security provider plans to use the funds to scale and better meet market demand. [Read More]
Several critical vulnerabilities found in a Swisslog Healthcare pneumatic tube system used in a majority of North American hospitals can be highly useful for ransomware attacks. [Read More]
IP cameras from a dozen vendors are exposed to remote attacks due to serious vulnerabilities found in the firmware they all use. [Read More]
Pavel Tsurkan, of Estonia, compromised more than 1,000 computers and routers and built a proxy botnet he then used to transmit traffic. [Read More]
During lockdown, offices have been empty and quiet – but not dead. Networks have continued to run, and IoT devices have continued to operate unattended. Many of these devices have communicated in plain text leaving the networks vulnerable. [Read More]
NanoLock Security, a company specializing in IoT and OT device protection and management, has raised $11 million in a Series B funding round. [Read More]
CISA says Vue healthcare products made by Philips are affected by 15 vulnerabilities, including ones rated critical and ones that impact third-party components. [Read More]
WD warns customers that someone has been exploiting an old vulnerability to hack My Book Live NAS devices and trigger a factory reset that results in all data being erased. [Read More]

FEATURES, INSIGHTS // IoT Security

rss icon

Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.