Select Page
Fight Ransomware and IoT Vulnerabilities

New OT/IoT Security Report

Available in English, Japanese, Portuguese, and Spanish

What You Need to Know to Fight Ransomware and IoT Vulnerabilities

Report Highlights:

 

  • Ransomware Insights
    • Why ransomware is a formidable threat
    • How Ransomware as a Service works
    • Analysis of DarkSide, the malware that attacked Colonial Pipeline
    • Recommendations for infection prevention, network segmentation, disaster recovery planning and more
  • New research findings on ICS and medical device vulnerabilities
  • IoT Security Camera Vulnerabilities
    • Why P2P security camera architecture threatens confidentiality
    • How security cameras are vulnerable
    • Research findings on the Reolink, Throughtek and Verkada breaches
  • More recommendations for network defenders
FROM THE REPORT
cameras-feed

The Live Video Feeds of 150,000 Security Cameras were Exposed in the Verkada Cyberattack

Attackers were also able to execute shell commands on breached cameras, providing an entry point for lateral movement on victims’ networks. This could lead to consequences such as data theft, ransomware deployment or system disruption.

Read the full 39-page report to learn why it’s time to re-evaluate your risk models and security programs.

Download the 9-page Executive Summary for research highlights.

Our Latest OT/IoT Cybersecurity Research

Investigating the Ransomware and IoT Vulnerabilities Landscape
WEBINAR

Investigating the Ransomware and IoT Vulnerabilities Landscape

Supply Chain and Persistent Ransomware Attacks
RESEARCH REPORT

OT/IoT Security Report February 2021: Supply Chain and Persistent Ransomware Attacks Reach New Heights

OT/IoT Security Report 2020 1H
RESEARCH REPORT

OT/IoT Security Report 2020 1H – Rising IoT Botnets and Shifting Ransomware Escalate Enterprise Risk

Nozomi Networks logo - Dedicated to reducing cyber risk for the world’s industrial, OT and IoT organizations

Dedicated to reducing cyber risk for the world’s industrial, OT and IoT organizations

OT and IoT security

Want to Know More?