Ripple20-Vulnerabilities-BLOG

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library. The ...
IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post IEC 61850 Meets IEC 62351: ...
IoT-Botnet-Dark-Nexus-BLOG

Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post Dark Nexus IoT Botnet: Analyzing ...
COVID-19 Chinoxy Backdoor: A Network Perspective

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19. Nozomi Networks Labs examines how network traffic analysis can ...
OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and ...
COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

COVID-19 (coronavirus) Malware: New OT and IoT Security Tools

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and ...
CVSS chart

The State of Vulnerabilities in 2019

As a web application firewall provider, part of our job at Imperva is to continually monitor for new security vulnerabilities. To do this, we use internal software that collects information from various ...

Imperva Mitigates Exploits of Citrix Vulnerability – Right Out of the Box

| | Application Security, Labs
On December 17, Citrix issued a Security Bulletin on an unauthenticated remote code execution vulnerability (CVE-2019-19781) affecting its Citrix Application Delivery Controller (ADC) – formerly known as NetScaler ADC – and its ...
Salt 2 diagram 1

Adding Some Salt to Our Network – Part 2

| | Application Delivery, Labs
How our configuration management actually works Following a previous post which explained why we needed a configuration management system, this post explores how we built and implemented our configuration management using SaltStack ...
ETL post

Serverless ETLs? Easy Data Lake Transformations using AWS Athena

| | Labs
In a data lake raw data is added with little or no processing, allowing you to query it straight away. This gives you a great way to learn about your data – ...