Security Experts:

long dotted


Researchers discovered that the brake controllers found on many tractor-trailers in North America are susceptible to remote hacker attacks. [Read More]
Based on the BotenaGo source code that leaked online in October 2021, the new threat appears designed to spread Mirai to Lilin cameras. [Read More]
Users will need to create custom user accounts for new installations, as the default “pi” user in Raspberry Pi OS will no longer be set up. [Read More]
The U.S. government announced that it had neutralized the massive "Cyclops Blink" botnet of hardware devices controlled by Russia’s main intelligence agency (GRU). [Read More]
The Mirai-based DDoS botnet known as Beastmode continues to expand its arsenal with at least five new exploits added over the last two months. [Read More]
Researchers have identified a new attack method, dubbed Brokenwire, that can be used to remotely interrupt the charging of electric vehicles. [Read More]
CISA says that removing internet access to the management interface of UPS devices prevents attacks. [Read More]
A researcher has published proof-of-concept (PoC) videos to demonstrate how an attacker can remotely unlock the doors of a Honda vehicle, or even start its engine. [Read More]
HP this week released patches for a critical-severity vulnerability that impacts roughly 250 printer models. [Read More]
Censys warns that a new wave of DeadBolt ransomware attacks targets QNAP NAS products, with nearly 1,500 devices currently infected. [Read More]


rss icon

Marie Hattar's picture
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Marie Hattar's picture
There is a pressing need tighten IoT security, especially in an insecure world where these unmanaged devices are playing a rapidly-growing and increasingly important role
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.