How to get started with OT security

How to get started with OT security

In the last couple of years, OT security has managed to get plenty of attention from security teams. Some businesses have even started having dedicated teams to manage OT security and tools ...
The future of IoT ransomware – targeted multi-function bots and more cyberattacks  

The future of IoT ransomware – targeted multi-function bots and more cyberattacks  

A new IoT malware was detected in October 2021 with as many as 30 exploit mechanisms that were coded into it. This malware called BotenaGo was able to seek out and attack ...
Shodan EV certificates

Shodan: Still the Scariest Search Engine on the Internet? 

In April of 2013, CNN introduced the world to Shodan, a search engine for internet-connected devices, by publishing an article titled, Shodan: The scariest search engine on the Internet. CNN described how ...
Security Boulevard
‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

Tesla cars can be unlocked and stolen via a simple relay attack. The company shrugged and said it’s “a known limitation.” ...
Security Boulevard
Do You Want Secure Supply Chains? SHOW ME THE MONEY

Do You Want Secure Supply Chains? SHOW ME THE MONEY

The Open Source Security Foundation and Linux Foundation have a plan to fix our broken software supply chains. 1.5M Benjamins needed ...
Security Boulevard
Siemens PXC4.E16 Building Automation System on graphic background.

Nozomi Networks Discovers Vulnerability in Siemens Building Automation Software

Recently, we had the opportunity to do a security analysis of the Siemens PXC4.E16, a Building Automation System (BAS) of the Desigo/APOGEE family for HVAC and building service plants. In this blog, ...
IoT Security

5 Top IoT Security Challenges and Solutions

The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...
Security Boulevard
When it comes to security, is IoT the new OT? 

When it comes to security, is IoT the new OT? 

Operational Technology (OT) has certainly been around for much longer in some form when compared to both Information Technology (IT) and the Internet of Things (IoT). Yet, when it comes to OT ...
Log4j Exchange ProxyLogon OT PKI IoT security

Log4j, ProxyLogon Top 2021 Exploitable Vulnerabilities List 

The Log4Shell vulnerability affecting Apache’s Log4j library and the ProxyLogon and ProxyShell vulnerabilities affecting Microsoft Exchange email servers topped the list of the most routinely exploited vulnerabilities in 2021. These threats were ...
Security Boulevard

Forrester Report Reveals the 5 Benefits IT Teams Really Need from API Security Tools

An Application Programming Interface (API) is a software intermediary that allows applications to communicate with one another. APIs provide routines, protocols, and tools for developers to facilitate and accelerate the creation of ...