Industrial Cyber Security Blog
On January 4th, the U.S. Department of Homeland Security (DHS) issued a National Terrorism Advisory bulletin warning of a potential cyberattack by Iran in the wake of a U.S. drone attack that killed a senior Iranian military commander.
Read Nozomi Networks experts take on the new reality of cyberattacks on U.S. interests.
The building automation and facility sector is rapidly adopting IoT-based systems with the goal of significantly reducing operational costs. This digital transformation is connecting legacy systems to new devices and sensors, expanding the attack surface for cyber threats.
Let’s look at both the promise of smart buildings and the realities of managing their cybersecurity risks.
Senior executives at industrial and OT organizations increasingly need to understand the full scope of their cyber risks. However, their confidence with current monitoring for OT/IoT systems is typically low.
To help tackle this challenge, IBM and Nozomi Networks are expanding the capabilities and solutions we offer together to deliver unified IT, IoT, and OT cyber security.
Recent Labs Posts
A well-known RTOS (Real-Time Operating System), widely used in industrial sectors, is at risk from a series of 11 vulnerabilities dubbed URGENT/11.
Nozomi Networks Labs conducted research on the vulnerable devices and has released threat signatures for URGENT/11 that identify threats in typical industrial networks without generating high numbers of false positive alerts.
On August 13, 2019, the Siemens CERT Team issued an advisory (SSA-100232) concerning Siemens SCALANCE switch devices. This vulnerability was responsibly disclosed to Siemens CERT Team and CISA by Nozomi Networks Labs.
Learn more about our findings and gain a better understanding of the cyber risks of legacy devices.
Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs).
Using the IEC 62351 standard for monitoring industrial networks, we demonstrate how four types of hard-to-detect attacks are readily identified.