Security Experts:

long dotted


An 18-month research project named Project Memoria has resulted in the discovery of nearly 100 vulnerabilities across 14 TCP/IP stacks. [Read More]
The newly identified vulnerabilities likely affect numerous safety-critical devices, such as patient monitors and other healthcare systems. [Read More]
Pwn2Own Austin 2021 has come to an end, with participants earning a total of more than $1 million for their router, printer, NAS device, smartphone and smart speaker exploits. [Read More]
Hackers have earned over $360,000 on the first day of Pwn2Own for hacking smart speakers, NAS devices, routers, and printers. [Read More]
Vulnerabilities discovered by Tenable in Johnson Controls’ exacqVision product can expose video surveillance systems to remote attacks. [Read More]
Medtronic is recalling remote controllers used with some of its insulin pumps due to cybersecurity risks that could lead to injury and even death. [Read More]
CISA is telling organizations to patch their Hikvision cameras, just as the FCC announced taking steps toward removing Chinese equipment from U.S. networks. [Read More]
The four countries will support new initiatives to improve the resilience of critical infrastructure against cyberattacks. [Read More]
LG is acquiring Israel-based vehicle cybersecurity company Cybellum for roughly $240 million. [Read More]
More than 70 Hikvision cameras and NVRs are affected by a critical vulnerability that can allow an attacker to take control of devices without user interaction. [Read More]


rss icon

Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.