Zero Trust for OT and IoT - Nozomi Networks

Don’t Trust But Verify: Getting to Zero Trust for OT and IoT

Zero trust requires knowing how systems interact and how to minimize information access. This isn’t simple to apply, especially for existing OT and IoT systems. The post Don’t Trust But Verify: Getting ...
Nozomi Networks Labs’ new OT/IoT Security Report covers cyberattack trends, vulnerability research, and best practices in remediation efforts.

New OT/IoT Security Report: Trends and Countermeasures for Critical Infrastructure Attacks

The post New OT/IoT Security Report: Trends and Countermeasures for Critical Infrastructure Attacks appeared first on Nozomi Networks ...
Postdissectors can be used to start dissection after all the "normal" dissectors have done their jobs, and help us fully understand the protocol’s Data content.

The Clever Use of Postdissectors to Analyze Layer 2 Protocols

Nozomi Networks Labs analyzes the Layer 2 protocol used by the RUGGEDCOM devices, focusing on how to instruct Wireshark to properly detect it and begin the dissection process. The post The Clever ...
Nozomi Networks Labs has discovered five vulnerabilities affecting Mitsubishi safety PLCs, used in many industries.

New Research Uncovers 5 Vulnerabilities in Mitsubishi Safety PLCs

Vulnerabilities in Mitsubishi Safety PLCs were discovered by Nozomi Networks Labs. As no patches are available, we outline general mitigations that can be used to protect operational environments. The Nozomi Networks Threat ...
We face an uphill battle against adversaries willing to burn the tech ecosystem

Why Fight Uphill? Level the Playing Field with SaaS OT Security.

Rather than fighting back post-breach, it’s more effective to level the playing field pre-breach. SaaS OT security is uniquely able to do that. The post Why Fight Uphill? Level the Playing Field ...
PrintNightmare-2-BLOG

PrintNightmare: How To Check If Your Systems Are Still Vulnerable

PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts). The post ...
With today’s ransomware tactics, everyone is fair game

Are You Ready for the Perfect Operational Security Storm?

A perfect operational security storm is brewing. It has less to do with what hackers are doing & more to do with what businesses aren’t doing. The post Are You Ready for ...
A vulnerability for Windows Print Spooler services

PrintNightmare: Remote Code Execution in Windows Spooler Service

Several vulnerabilities affecting the Windows Print Service spooler require urgent attention by security teams across all industries. These risks are particularly concerning because the vulnerable service is enabled by default for Windows ...
Functional-Safety-BLOG

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark ...
Verkada-BLOG

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the ...