OT security

Don’t Trust But Verify: Getting to Zero Trust for OT and IoT
Zero trust requires knowing how systems interact and how to minimize information access. This isn’t simple to apply, especially for existing OT and IoT systems. The post Don’t Trust But Verify: Getting ...

New OT/IoT Security Report: Trends and Countermeasures for Critical Infrastructure Attacks
The post New OT/IoT Security Report: Trends and Countermeasures for Critical Infrastructure Attacks appeared first on Nozomi Networks ...

The Clever Use of Postdissectors to Analyze Layer 2 Protocols
Nozomi Networks Labs analyzes the Layer 2 protocol used by the RUGGEDCOM devices, focusing on how to instruct Wireshark to properly detect it and begin the dissection process. The post The Clever ...

New Research Uncovers 5 Vulnerabilities in Mitsubishi Safety PLCs
Vulnerabilities in Mitsubishi Safety PLCs were discovered by Nozomi Networks Labs. As no patches are available, we outline general mitigations that can be used to protect operational environments. The Nozomi Networks Threat ...

Why Fight Uphill? Level the Playing Field with SaaS OT Security.
Rather than fighting back post-breach, it’s more effective to level the playing field pre-breach. SaaS OT security is uniquely able to do that. The post Why Fight Uphill? Level the Playing Field ...

PrintNightmare: How To Check If Your Systems Are Still Vulnerable
PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts). The post ...

Are You Ready for the Perfect Operational Security Storm?
A perfect operational security storm is brewing. It has less to do with what hackers are doing & more to do with what businesses aren’t doing. The post Are You Ready for ...

PrintNightmare: Remote Code Execution in Windows Spooler Service
Several vulnerabilities affecting the Windows Print Service spooler require urgent attention by security teams across all industries. These risks are particularly concerning because the vulnerable service is enabled by default for Windows ...

How to Dissect Unusual Protocols for Troubleshooting OT Security
To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark ...

Defending Against IoT Security Camera Hacks Like Verkada
Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the ...