What IT Needs to Know about OT/IoT Security Threats in 2020

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations. The post What IT Needs to Know about OT/IoT ...
Enhanced Product Security Incident Response Reduces Customer Risk

Enhanced Product Security Incident Response Reduces Customer Risk

Nozomi Networks is quickly expanding to serve more and more industrial, critical infrastructure and operational technology sectors in countries around the globe. The post Enhanced Product Security Incident Response Reduces Customer Risk ...
Ripple20-Vulnerabilities-BLOG

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library. The ...
IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post IEC 61850 Meets IEC 62351: ...
IoT-Botnet-Dark-Nexus-BLOG

Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post Dark Nexus IoT Botnet: Analyzing ...
COVID-19 Chinoxy Backdoor: A Network Perspective

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19. Nozomi Networks Labs examines how network traffic analysis can ...
OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and ...
COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and ...
Act Now on Critical Microsoft SMB Vulnerability (CVE-2020-0796)

Act Now on Critical Microsoft SMB Vulnerability (CVE-2020-0796)

On March 10th, Microsoft published a security advisory of critical severity for CVE-2020-0796, which is a remote code execution vulnerability affecting the Microsoft Server Message Block 3.1.1 (SMBv3). The post Act Now ...
Recent Ransomware Threatens OT Security, Reputation and GDPR Fines

Recent Ransomware Threatens OT Security, Reputation and GDPR Fines

Last week we reported that a new wave of ransomware is threatening OT security. The Snake file encrypting ransomware, for example, includes code that has the explicit goal of causing process disruption ...