Siemens PXC4.E16 Building Automation System on graphic background.

Nozomi Networks Discovers Vulnerability in Siemens Building Automation Software

Recently, we had the opportunity to do a security analysis of the Siemens PXC4.E16, a Building Automation System (BAS) of the Desigo/APOGEE family for HVAC and building service plants. In this blog, ...
Conti ransom ransomware

US Offers $15M Reward for Conti Ransomware Gang 

The U.S. Department of State announced a reward of up to $10 million for information leading to the identification or location of key leaders of the Conti ransomware crime group, which has ...
Security Boulevard
quantum defense in depth

National Security Memo Highlights Quantum Computing Risks

A White House memo directed at federal agencies aims to jumpstart efforts to move vulnerable security systems to a quantum-resistant cryptography security posture and maintain investment in quantum computing technology.  The document, ...
Security Boulevard
Grindr trespass

Sale of Grindr Data Illuminates Privacy Blindspots

Was anyone truly shocked to learn that user data from Grindr, a social networking app for gay, bi, trans and queer men, had been collected and sold on ad networks for many ...
Security Boulevard

Security Advocacy in the Cloud with Jacob Ansari from Schellman

In this episode, we talk with Jacob Ansari, a Security Advocate at Schellman, where he leads the firm’s security best practices advocacy. He develops and leads educational efforts on security practices, emerging ...
Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape

Five Ways the Ukraine-Russia War Could Alter the Cyber Landscape

Synopsis In this paper, EclecticIQ analysts examined various drivers of the Ukraine-Russia war to identify and describe possible outcomes for cyber and technology in the context of the ongoing Ukraine-Russia war. Analysts ...
TLStorm CCPA

TLStorm 2.0 Flaws Leave Aruba, Avaya Switches Vulnerable

A handful of vulnerabilities in the implementation of TLS communications in Aruba and Avaya switches extend TLStorm flaws first discovered in March to millions of enterprise-grade network infrastructure devices. By exploiting these ...
Security Boulevard
Putin’s ‘Victory Parade’ TV Show Hacked: ‘Blood on Your Hands’

Putin’s ‘Victory Parade’ TV Show Hacked: ‘Blood on Your Hands’

Ukrainian hackers and their friends continue to pummel Russian computers. “Hundreds of millions of documents” are being leaked. And today, Putin’s famous Victory Parade has been marred by hackers ...
Security Boulevard
IoT Security

5 Top IoT Security Challenges and Solutions

The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...
Security Boulevard