Labs Blogs - Tagged - Security Boulevard
PrintNightmare-2-BLOG

PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts). The post ...
OT-IoT-Security-Report-2021-1H-BLOG

New Report: Ransomware, Vulnerabilities and IoT Security Threats

Nozomi Networks Labs has produced a new OT/IoT security report. Don’t miss this summary of vulnerability trends as well as important information about ransomware and IoT security camera threats. The post New ...
A vulnerability for Windows Print Spooler services

PrintNightmare: Remote Code Execution in Windows Spooler Service

Several vulnerabilities affecting the Windows Print Service spooler require urgent attention by security teams across all industries. These risks are particularly concerning because the vulnerable service is enabled by default for Windows ...
Functional-Safety-BLOG

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark ...
placeholder-1400x933px

New IoT Security Risk: ThroughTek P2P Supply Chain Vulnerability

Nozomi Networks Labs announces the discovery and disclosure of a new security camera vulnerability. It affects an embedded P2P software component from ThroughTek. This component is part of the supply chain for ...
Functional-Safety-BLOG

Demonstrating the Link Between Functional Safety and ICS Security

In industrial control systems (ICS) with no protection measures, it can be easy for a threat actor to disrupt the system, threatening safety and production. Watch a simulated DoS attack to see ...
placeholder-1400x933px

Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works

The Colonial Pipeline ransomware attack is one of the most notable critical infrastructure breaches of recent years. Learn the encryption, anti-detection and other techniques used by DarkSide’s main executable so you can ...
Labs-Code-Blue-Security-Camera-Blog

Threat Intelligence: Analysis of the SBIDIOT IoT Malware

Billions of IoT devices are used in the industrial sector and threat actors are quickly evolving new malware focused on them. Don’t miss this analysis of the SBIDIOT IoT malware to learn ...
Verkada-BLOG

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the ...
Reolink-P2P-Vulnerabilities-BLOG

New Report: Top OT/IoT Security Threats and Vulnerabilities

Nozomi Networks Labs has produced a new OT/IoT security report. This blog summarizes the most significant threats and vulnerability trends, as well as recommendations for improving your security posture. Read the blog ...