Security Experts:

long dotted


Censys warns that a new wave of DeadBolt ransomware attacks targets QNAP NAS products, with nearly 1,500 devices currently infected. [Read More]
The company has published instructions on how users can secure their devices against potential compromise. [Read More]
CISA and FBI issue a cybersecurity warning for SATCOM network providers as Western intelligence agencies investigate a cyberattack that may have been launched by Russia. [Read More]
Critical supply chain vulnerabilities in PTC’s Axeda agent affect 150 device models from more than 100 manufacturers. [Read More]
Millions of uninterruptible power supply (UPS) devices made by APC can be remotely hacked and damaged due to critical vulnerabilities. [Read More]
IoT security firm Phosphorus Cybersecurity has raised $38 million in a Series A funding round. The company discovers, delivers timely and automated patching and credential rotation for IoT devices in what it calls the ‘Security of Things’. [Read More]
Researchers have discovered nearly two dozen high-severity vulnerabilities in UEFI firmware that is present in millions of enterprise devices. [Read More]
Schneider Electric has patched several new vulnerabilities that expose its EVlink electric vehicle charging stations to remote hacking. [Read More]
Afero closes a $50 million Series C investment round led by Crosspoint Capital Partners. [Read More]
Industrial cybersecurity firm Claroty has raised $400 million in a Series E funding round, and it has entered an agreement to buy healthcare IoT security company Medigate. [Read More]


rss icon

Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Seema Haji's picture
New technology like IoMT in any space is always a double-edged sword. But the onus is not on manufacturers alone. It’s up to healthcare organizations to take the initiative to manage and secure their environments.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.