Security Experts:

long dotted


Self-disclosures by XIoT vendors have surpassed independent research outfits as the second most prolific vulnerability reporters. [Read More]
Cybersecurity firm Cyfirma has identified more than 80,000 Hikvision cameras still affected by a critical code execution vulnerability patched in September 2021. [Read More]
Following complaints from the industry, the TSA has updated its pipeline cybersecurity requirements to provide more flexibility in achieving goals. [Read More]
Widely used Micodus vehicle GPS trackers are affected by critical vulnerabilities that can be exploited by hackers to stalk people and remotely disable cars. [Read More]
Researchers have found a vulnerability in the rolling codes mechanism of the remote keyless entry system of Honda vehicles that allows them to open the car doors and start the engine. [Read More]
Air raid sirens sounded in Israeli cities on Sunday and it appears they may have been triggered by hackers possibly operating out of Iran. [Read More]
Schneider Electric and Claroty have announced the launch of a new cybersecurity solution for buildings. [Read More]
A researcher has found a new way to hack and steal Teslas, via a Bluetooth-based relay attack that abuses a key card feature. [Read More]
Access control products from LenelS2 and other vendors using HID Mercury controllers are affected by vulnerabilities that can allow hackers to remotely unlock doors. [Read More]
Tracked as CVE-2022-31460, the vulnerability allows attackers to turn the video conferencing devices into rogue access points. [Read More]


rss icon

Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Marie Hattar's picture
As IoT adoption increases within healthcare, healthcare organizations and device manufacturers will need to prioritize the security of connected medical devices to keep patient data private and ensure the safety of the patient.
Derek Manky's picture
Linux is becoming a more popular target for attackers as it operates the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Marie Hattar's picture
There is a pressing need tighten IoT security, especially in an insecure world where these unmanaged devices are playing a rapidly-growing and increasingly important role
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.