Nozomi Networks Labs announces the discovery and disclosure of a new security camera vulnerability. It affects an embedded P2P software component from ThroughTek. This component is part of the supply chain for many original equipment manufacturers (OEMs) of consumer-grade security cameras and IoT devices.
The Colonial Pipeline ransomware attack is one of the most notable critical infrastructure breaches of recent years. Learn the encryption, anti-detection and other techniques used by DarkSide’s main executable so you can evaluate your own defenses. Includes IoCs and a decryption script for detection.
The Colonial Pipeline breach has made ransomware attacks a top concern. Besides following CISA’s Darkside alert advice, governments need to act to improve cybersecurity and hold threat actors accountable. Just as important, asset owners need to adopt a post-breach mindset.
Every time there’s a cyberattack like the recent ransomware targeting Colonial Pipeline, industry experts scramble to share thoughts on what could have been done to thwart it, or what the impact of a breach could be. Organizations need to reset themselves to have a post-breach mindset, pre-breach.
Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs).
Using the IEC 62351 standard for monitoring industrial networks, we demonstrate how four types of hard-to-detect attacks are readily identified.
Companies operating in the midstream oil and gas market face significant challenges in securing their infrastructure. The first step to reducing risk is knowing what devices and networks are running on your system.
Find out how an industrial cyber security and visibility solution addresses the real-world challenges of pipeline operators.