Alessandro Di Pinto, Author at Security Boulevard
Verkada-BLOG

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the attack - and helped them contain and mitigate its impact. The post Defending Against IoT Security Camera Hacks ... Read More
Reolink-P2P-Vulnerabilities-BLOG

New Report: Top OT/IoT Security Threats and Vulnerabilities

Nozomi Networks Labs has produced a new OT/IoT security report. This blog summarizes the most significant threats and vulnerability trends, as well as recommendations for improving your security posture. Read the blog and get the report to speed up your understanding of the current threat landscape. The post New Report: ... Read More
Reolink-P2P-Vulnerabilities-BLOG

New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

Nozomi Networks Labs has discovered vulnerabilities in the Peer-to-Peer (P2P) feature of a commonly used line of security cameras – Reolink. P2P is used by several vendors and, if your CCTV camera has this feature, it’s important to understand the potential security risks. The post New Reolink P2P Vulnerabilities Show ... Read More
Blog-38-Unconventional-DNS-BLOG

New Threat Intelligence Reveals Misuse of DNS Protocol

Nozomi Networks Labs has uncovered new misuse of the DNS protocol that opens the door to significant threats in the future. We urge security teams to familiarize themselves with this new threat intelligence and centrally monitor their systems for problematic network traffic. The post New Threat Intelligence Reveals Misuse of ... Read More
IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Networks ... Read More
IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Networks ... Read More
Blog-25-Mitre-Att&ck-Framework-BLOG

Your Guide to the MITRE ATT&CK Framework for ICS

Learn how security teams can use details about adversary behavior and actions contained in the MITRE ATT&CK Framework for ICS to enhance their security strategies. The post Your Guide to the MITRE ATT&CK Framework for ICS appeared first on Nozomi Networks ... Read More
Blog-25-Mitre-Att&ck-Framework-BLOG

Your Guide to the MITRE ATT&CK Framework for ICS

Learn how security teams can use details about adversary behavior and actions contained in the MITRE ATT&CK Framework for ICS to enhance their security strategies. The post Your Guide to the MITRE ATT&CK Framework for ICS appeared first on Nozomi Networks ... Read More
What IT Needs to Know about OT/IoT Security Threats in 2020

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations. The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networks ... Read More
What IT Needs to Know about OT/IoT Security Threats in 2020

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations. The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networks ... Read More
Loading...