You are here

Cybersecurity

Cyber Resilience – Don't be Soft about Hardware Security

A recent post at The Hacker News discusses the importance of proactive security measures to prevent attacks. Specifically, the post suggests that relying solely on software protections can often be inadequate for safeguarding valuable assets. Software protections are also challenging because software is inherently complicated allowing vulnerabilities to abound even in the very applications meant for security. This challenge serves as a reminder of the importance of applying a complimentary approach based on hardware security.

Cyber Resilience – VPN Exploitation, Don’t Blindly Trust Your VPN

From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices and remote services. Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities. This includes VPNs, as a compromised VPN server could allow attackers to easily gain control over other critical assets in the network.

ICS/OT Threat Awareness – Censys Researchers Reveal Over 40,000 Vulnerable ICS Devices, Many Linked to Water and Wastewater

Recent research conducted by Censys, an internet intelligence platform, provides an extensive analysis of the exposure of industrial control systems (ICS), discovering over 40,000 vulnerable ICS devices in the U.S. alone. Excluding building control and automation protocols, there are approximately 18,000 exposed devices likely controlling critical industrial systems. Additionally, nearly half of the human-machine interfaces (HMIs) associated with water and wastewater systems were found to be vulnerable to manipulation without requiring any authentication.

Pages

Subscribe to Cybersecurity