IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Networks ... Read More
IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Networks ... Read More
Blog-25-Mitre-Att&ck-Framework-BLOG

Your Guide to the MITRE ATT&CK Framework for ICS

Learn how security teams can use details about adversary behavior and actions contained in the MITRE ATT&CK Framework for ICS to enhance their security strategies. The post Your Guide to the MITRE ATT&CK Framework for ICS appeared first on Nozomi Networks ... Read More
Blog-25-Mitre-Att&ck-Framework-BLOG

Your Guide to the MITRE ATT&CK Framework for ICS

Learn how security teams can use details about adversary behavior and actions contained in the MITRE ATT&CK Framework for ICS to enhance their security strategies. The post Your Guide to the MITRE ATT&CK Framework for ICS appeared first on Nozomi Networks ... Read More
What IT Needs to Know about OT/IoT Security Threats in 2020

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations. The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networks ... Read More
What IT Needs to Know about OT/IoT Security Threats in 2020

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations. The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networks ... Read More
Ripple20-Vulnerabilities-BLOG

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library. The post Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT appeared first on Nozomi Networks ... Read More
IoT-Botnet-Dark-Nexus-BLOG

Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity appeared first on Nozomi Networks ... Read More
COVID-19 Chinoxy Backdoor: A Network Perspective

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19. Nozomi Networks Labs examines how network traffic analysis can detect this specific threat. The post COVID-19 Chinoxy Backdoor: A Network Perspective appeared first on Nozomi Networks ... Read More
Act Now on Critical Microsoft SMB Vulnerability (CVE-2020-0796)

Act Now on Critical Microsoft SMB Vulnerability (CVE-2020-0796)

On March 10th, Microsoft published a security advisory of critical severity for CVE-2020-0796, which is a remote code execution vulnerability affecting the Microsoft Server Message Block 3.1.1 (SMBv3). The post Act Now on Critical Microsoft SMB Vulnerability (CVE-2020-0796) appeared first on Nozomi Networks ... Read More