Vulnerabilities in Mitsubishi Safety PLCs were discovered by Nozomi Networks Labs. As no patches are available, we outline general mitigations that can be used to protect operational environments. The Nozomi Networks Threat Intelligence service also includes detection logic for these vulnerabilities.
PrintNightmare: Cybersecurity researchers continue to uncover new, related vulnerabilities that can be exploited. Learn how to determine whether your systems remain vulnerable to known popular exploit PoCs (Proof of Concepts).
Several vulnerabilities affecting the Windows Print Service spooler require urgent attention by security teams across all industries. These risks are particularly concerning because the vulnerable service is enabled by default for Windows Domain Servers, the most sought-after target for attackers.
In industrial control systems (ICS) with no protection measures, it can be easy for a threat actor to disrupt the system, threatening safety and production. Watch a simulated DoS attack to see how an attacker could exploit bad practices, and review what should be done to prevent such an attack.
Nozomi Networks Labs has produced a new OT/IoT security report. This blog summarizes the most significant threats and vulnerability trends, as well as recommendations for improving your security posture. Read the blog and get the report to speed up your understanding of the current threat landscape.