IoT-Botnet-Dark-Nexus-BLOG

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them. The post Overcoming the Challenges of Detecting P2P Botnets ...
IoT-Botnet-Dark-Nexus-BLOG

Dark Nexus IoT Botnet: Analyzing and Detecting its Network Activity

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations. The post Dark Nexus IoT Botnet: Analyzing ...
COVID-19 Chinoxy Backdoor: A Network Perspective

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19. Nozomi Networks Labs examines how network traffic analysis can ...

Eight ways to improve cyber-hygiene in the enterprise

Good hygiene keeps you safe and healthy, as well as others around you. It’s the same with cyber-hygiene – the sets of practices that organizations are increasingly adopting in a structured way ...

Malware vs. Antivirus: the never-ending story (Part III)

In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “[antivirus] ...

Malware vs. Antivirus: the never-ending story (Part II)

In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “[antivirus] ...