Labs - Tagged - Security Boulevard
Functional-Safety-BLOG

Demonstrating the Link Between Functional Safety and ICS Security

In industrial control systems (ICS) with no protection measures, it can be easy for a threat actor to disrupt the system, threatening safety and production. Watch a simulated DoS attack to see ...
placeholder-1400x933px

Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works

The Colonial Pipeline ransomware attack is one of the most notable critical infrastructure breaches of recent years. Learn the encryption, anti-detection and other techniques used by DarkSide’s main executable so you can ...
Labs-Code-Blue-Security-Camera-Blog

Threat Intelligence: Analysis of the SBIDIOT IoT Malware

Billions of IoT devices are used in the industrial sector and threat actors are quickly evolving new malware focused on them. Don’t miss this analysis of the SBIDIOT IoT malware to learn ...
Verkada-BLOG

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the ...
Reolink-P2P-Vulnerabilities-BLOG

New Report: Top OT/IoT Security Threats and Vulnerabilities

Nozomi Networks Labs has produced a new OT/IoT security report. This blog summarizes the most significant threats and vulnerability trends, as well as recommendations for improving your security posture. Read the blog ...
Reolink-P2P-Vulnerabilities-BLOG

New Reolink P2P Vulnerabilities Show IoT Security Camera Risks

Nozomi Networks Labs has discovered vulnerabilities in the Peer-to-Peer (P2P) feature of a commonly used line of security cameras – Reolink. P2P is used by several vendors and, if your CCTV camera ...
Blog-38-Unconventional-DNS-BLOG

New Threat Intelligence Reveals Misuse of DNS Protocol

Nozomi Networks Labs has uncovered new misuse of the DNS protocol that opens the door to significant threats in the future. We urge security teams to familiarize themselves with this new threat ...
IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets ...
IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets ...

Video: TryHackMe – Behind the Curtain

Watch Now for Your Very Own Backstage Pass! Video and Slide Deck from EH-Net Live! Aug 2020 With the growing need for security professionals, a huge number of people are flooding the ...