Select Page

New OT/IoT Security Report

Available in English, Japanese, and Spanish

What You Need to Know to Fight Ransomware and IoT Vulnerabilities

Report Highlights:


  • Ransomware Insights
    • Why ransomware is a formidable threat
    • How Ransomware as a Service works
    • Analysis of DarkSide, the malware that attacked Colonial Pipeline
    • Recommendations for infection prevention, network segmentation, disaster recovery planning and more
  • New research findings on ICS and medical device vulnerabilities
  • IoT Security Camera Vulnerabilities
    • Why P2P security camera architecture threatens confidentiality
    • How security cameras are vulnerable
    • Research findings on the Reolink, Throughtek and Verkada breaches
  • More recommendations for network defenders

The Live Video Feeds of 150,000 Security Cameras were Exposed in the Verkada Cyberattack

Attackers were also able to execute shell commands on breached cameras, providing an entry point for lateral movement on victims’ networks. This could lead to consequences such as data theft, ransomware deployment or system disruption.

Read the full 39-page report to learn why it’s time to re-evaluate your risk models and security programs.

Download the 9-page Executive Summary for research highlights.

Our Latest OT/IoT Cybersecurity Research


Investigating the Ransomware and IoT Vulnerabilities Landscape


OT/IoT Security Report February 2021: Supply Chain and Persistent Ransomware Attacks Reach New Heights


OT/IoT Security Report 2020 1H – Rising IoT Botnets and Shifting Ransomware Escalate Enterprise Risk

Dedicated to reducing cyber risk for the world’s industrial, OT and IoT organizations

Want to Know More?