IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets ...
IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets ...
IoT-Botnet-Dark-Nexus-BLOG

Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post Dark Nexus IoT Botnet: Analyzing ...
COVID-19 Chinoxy Backdoor: A Network Perspective

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19. Nozomi Networks Labs examines how network traffic analysis can ...

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques ...

Four Key Elements for Comprehensive Network Threat Detection

Today’s cybersecurity landscape is a mix of old and new threats. Many of the attacks that organizations encounter involve legacy malware and techniques that are repackaged and reused (this post from security ...