Syndicated Blog

What Project Memoria Foretold about TCP/IP Security and Supply Chain Vulnerabilities

What Project Memoria Foretold about TCP/IP Security and Supply Chain Vulnerabilities

| | News & Views
Project Memoria was the largest study about the security of TCP/IP stacks, conducted by Vedere Labs and partners in the cybersecurity industry. It started from a collaboration with JSOF to understand the ...
The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

The Increasing Threat Posed by Hacktivist Attacks: An Analysis of Targeted Organizations, Devices and TTPs

| | News & Views
This year has seen an enormous increase in the number and claimed impact of hacktivist attacks on critical infrastructure and enterprises operating in critical services. Many attacks target unmanaged devices such as ...
OT:ICEFALL Continues: Vedere Labs Discloses Three New Vulnerabilities Affecting OT Products – How to Mitigate

OT:ICEFALL Continues: Vedere Labs Discloses Three New Vulnerabilities Affecting OT Products – How to Mitigate

| | News & Views
Continuing our OT:ICEFALL research, Vedere Labs has disclosed three new vulnerabilities affecting OT products from two German vendors: Festo automation controllers and the CODESYS runtime, which is used by hundreds of device ...

Extend Your SOC Team with 24/7 Remote OT Security

| | News & Views
Some economic sectors may be hitting the brakes, but the cybersecurity talent shortage persists across all industries and shows no signs of abating – not while sophisticated cyberattacks continue to rise in ...
OpenSSL CVE-2022-3602 and CVE-2022-3786 (Spooky SSL): What They Are and How to Mitigate Risk

OpenSSL CVE-2022-3602 and CVE-2022-3786 (Spooky SSL): What They Are and How to Mitigate Risk

| | News & Views
On November 1, OpenSSL v3.0.7 was released, patching two new high-severity vulnerabilities: CVE-2022-3602 and CVE-2022-3786. The new vulnerabilities have been dubbed by the community as “Spooky SSL,” although the name is not ...

Vulnerability vs. Threat vs. Risk vs… “Other”

| | News & Views
In cybersecurity, three key terms are vulnerability, threat and risk. Often they’re tossed around interchangeably, but they have a specific relationship to one another: A risk is the potential for loss or ...

Company Update: Forescout enters its next phase of evolution

| | News & Views
Over the last two years since going private, Forescout has undergone a significant transformation. We are extremely proud of our 20+ year heritage as the world’s leading network access control provider, yet ...

Company Update: Forescout Enters Its Next Phase of Evolution

| | News & Views
Over the last two years since going private, Forescout has undergone a significant transformation. We are extremely proud of our 20+ year heritage as the world’s leading network access control provider, yet ...

The Riskiest Connected Devices in Enterprise Networks

| | News & Views
The growing number and diversity of connected devices in every industry presents new challenges for organizations to understand and manage the risks they are exposed to. Most organizations now host a combination ...

Forescout Wins IoT Security Solution of the Year Award

| | News & Views
It’s with great pleasure that we announce that Forescout has been awarded with “Overall IoT Security Solution of the Year” for our Forescout Continuum Platform in the 6th annual CyberSecurity Breakthrough Awards ...