All - Tagged - Security Boulevard
Verkada-BLOG

Responding to the Colonial Pipeline Breach & CISA Ransomware Alert

The recent DarkSide ransomware attack on Colonial Pipeline, a critical infrastructure supplier of about 45% of the United States’ east coast gasoline, diesel and jet fuel, infected the company’s IT network. Learn ...
Colonial-Breach-BLOG

OT and IoT Security: Adopt a Post-Breach Mindset Today

Every time there’s a cyberattack like the recent ransomware targeting Colonial Pipeline, industry experts scramble to share thoughts on what could have been done to thwart it, or what the impact of ...
Focus-on-OT-and-IoT-Cybersecurity-in-Australia-s-Critical-Infrastructure-Blog-Featured

OT/IoT Security – Start From a Never Trust, Always Verify Mindset

The post OT/IoT Security – Start From a Never Trust, Always Verify Mindset appeared first on Nozomi Networks ...
A depiction of types of phishing, including spear phishing, whaling, vishing, smishing, and business email compromise.

7 Types of Phishing: How to Recognize Them & Stay Off the Hook

Phishing is today’s most dangerous cyberattack. Google noted a more than 600% spike in phishing attacks in 2020 compared to 2019 with a total of 2,145,013 phishing sites registered as of January ...
Verkada-BLOG

IoT Devices – The Newest Source of OT Network Security Gaps

IoT devices deliver huge benefits, but also create security gaps because organizations don’t have the tools needed to monitor & protect them. The post IoT Devices – The Newest Source of OT ...
Labs-Code-Blue-Security-Camera-Blog

Threat Intelligence: Analysis of the SBIDIOT IoT Malware

Billions of IoT devices are used in the industrial sector and threat actors are quickly evolving new malware focused on them. Don’t miss this analysis of the SBIDIOT IoT malware to learn ...
Verkada-BLOG

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the ...
Reolink-P2P-Vulnerabilities-BLOG

New Report: Top OT/IoT Security Threats and Vulnerabilities

Nozomi Networks Labs has produced a new OT/IoT security report. This blog summarizes the most significant threats and vulnerability trends, as well as recommendations for improving your security posture. Read the blog ...
Focus-on-OT-and-IoT-Cybersecurity-in-Australia-s-Critical-Infrastructure-Blog-Featured

Hard Lessons from the Oldsmar Water Facility Cyberattack Hack

An attacker used the TeamViewer app to remotely access Oldsmar’s water treatment system. This is a wakeup call for water districts everywhere. The post Hard Lessons from the Oldsmar Water Facility Cyberattack ...
Focus-on-OT-and-IoT-Cybersecurity-in-Australia-s-Critical-Infrastructure-Blog-Featured

The Cyber Risks of Transportation’s Connected OT/IoT Systems

Cyberattacks on transportation OT systems could disrupt port management, customs approval processes or facilitate the import of illegal goods. The post The Cyber Risks of Transportation’s Connected OT/IoT Systems appeared first on ...