Vulnerabilities

Nozomi Networks Discovers Vulnerability in Siemens Building Automation Software
Recently, we had the opportunity to do a security analysis of the Siemens PXC4.E16, a Building Automation System (BAS) of the Desigo/APOGEE family for HVAC and building service plants. In this blog, ...

US Offers $15M Reward for Conti Ransomware Gang
The U.S. Department of State announced a reward of up to $10 million for information leading to the identification or location of key leaders of the Conti ransomware crime group, which has ...

National Security Memo Highlights Quantum Computing Risks
A White House memo directed at federal agencies aims to jumpstart efforts to move vulnerable security systems to a quantum-resistant cryptography security posture and maintain investment in quantum computing technology. The document, ...

Sale of Grindr Data Illuminates Privacy Blindspots
Was anyone truly shocked to learn that user data from Grindr, a social networking app for gay, bi, trans and queer men, had been collected and sold on ad networks for many ...
Security Advocacy in the Cloud with Jacob Ansari from Schellman
In this episode, we talk with Jacob Ansari, a Security Advocate at Schellman, where he leads the firm’s security best practices advocacy. He develops and leads educational efforts on security practices, emerging ...

Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape
Synopsis In this paper, EclecticIQ analysts examined various drivers of the Ukraine-Russia war to identify and describe possible outcomes for cyber and technology in the context of the ongoing Ukraine-Russia war. Analysts ...

TLStorm 2.0 Flaws Leave Aruba, Avaya Switches Vulnerable
A handful of vulnerabilities in the implementation of TLS communications in Aruba and Avaya switches extend TLStorm flaws first discovered in March to millions of enterprise-grade network infrastructure devices. By exploiting these ...

Putin’s ‘Victory Parade’ TV Show Hacked: ‘Blood on Your Hands’
Ukrainian hackers and their friends continue to pummel Russian computers. “Hundreds of millions of documents” are being leaked. And today, Putin’s famous Victory Parade has been marred by hackers ...

5 Top IoT Security Challenges and Solutions
The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...

Biden Revs Up US Quantum Plans (Because China)
This week, the White House issued a memorandum and executive order that put a shedload of wood behind the quantum-computing arrow ...