IoT & ICS Security - Security Boulevard https://securityboulevard.com/category/blogs/iot-ics-security/ The Home of the Security Bloggers Network Sat, 31 Aug 2024 12:08:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png IoT & ICS Security - Security Boulevard https://securityboulevard.com/category/blogs/iot-ics-security/ 32 32 133346385 Modern Strategies for IoT Device Fingerprinting https://securityboulevard.com/2024/08/modern-strategies-for-iot-device-fingerprinting/ Sat, 31 Aug 2024 12:08:50 +0000 https://securityboulevard.com/?p=2029410 IoT, fingerprinting

The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management.

The post Modern Strategies for IoT Device Fingerprinting appeared first on Security Boulevard.

]]>
2029410
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril https://securityboulevard.com/2024/08/telegram-terrorgram-grid-richixbw/ Tue, 27 Aug 2024 17:19:11 +0000 https://securityboulevard.com/?p=2028965 Sign reads, “Danger: High Voltage!”

Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize.

The post ‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril appeared first on Security Boulevard.

]]>
2028965
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining https://securityboulevard.com/2024/08/gafgyt-botnet-weak-ssh-passwords-targeted-for-gpu-mining/ https://securityboulevard.com/2024/08/gafgyt-botnet-weak-ssh-passwords-targeted-for-gpu-mining/#respond Tue, 27 Aug 2024 07:00:36 +0000 https://tuxcare.com/?p=19762 A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In this article, we’ll dive into the details of the Gafgyt botnet and learn more about the attacks. Let’s begin! The Gafgyt Botnet Uncovered […]

The post Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining appeared first on TuxCare.

The post Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/gafgyt-botnet-weak-ssh-passwords-targeted-for-gpu-mining/feed/ 0 2028946
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent https://securityboulevard.com/2024/08/identities-arent-for-sale-tsa-biometrics-technology-and-the-need-for-consumer-consent/ https://securityboulevard.com/2024/08/identities-arent-for-sale-tsa-biometrics-technology-and-the-need-for-consumer-consent/#respond Fri, 23 Aug 2024 17:59:03 +0000 https://techspective.net/?p=35945 Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program has been reviewed and approved by Congress. Though […]

The post Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent appeared first on TechSpective.

The post Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/identities-arent-for-sale-tsa-biometrics-technology-and-the-need-for-consumer-consent/feed/ 0 2028776
A Comprehensive Outlook on OT Asset Inventory Management https://securityboulevard.com/2024/08/a-comprehensive-outlook-on-ot-asset-inventory-management/ https://securityboulevard.com/2024/08/a-comprehensive-outlook-on-ot-asset-inventory-management/#respond Tue, 20 Aug 2024 13:35:07 +0000 https://sectrio.com/?p=70457 Cybersecurity concerns in operational environments have also heightened the importance of asset inventory management. The November 2023 Aliquippa water plant in Pennsylvania cyberattack, which managed to access and shut down a pressure regulation pump, causing disruption in the municipal water supply, reminds us of the potential consequences of inadequate OT security measures. This attack targeted the plant’s OT systems, specifically a PLC-HMI system manufactured by Unitronics. Furthermore, regulatory bodies impose strict compliance requirements on industries to ensure safety and security. So, noncompliance can result in hefty fines and legal procedures for the organization. A strong OT asset inventory management system effectively helps organizations meet these regulatory requirements. For instance, by maintaining an updated and comprehensive OT asset inventory, organizations in the energy sector can ensure they adhere to industry standards and regulatory requirements, such as those set by NERC (North American Electric Reliability Corporation) for critical infrastructure protection. This compliance helps prevent hefty fines and legal procedures that result from non-compliance​ Thus a comprehensive asset inventory is the foundation for identifying vulnerabilities and implementing effective security controls. Key Components of OT Asset Inventory Management An effective OT asset inventory management system comprises several key components: Implementing an OT Asset Inventory Management System To implement a robust OT asset inventory management system, organizations should: Challenges in OT Asset Inventory Management Several challenges can complicate OT asset inventory management: Best Practices for Effective OT Asset Inventory Management To overcome these challenges and maximize the benefits of OT asset inventory management, organizations should adopt the following best practices: Benefits of Robust OT Asset Inventory Management A well-implemented OT asset inventory management system offers numerous benefits: OT asset inventory management is a necessity for ensuring the smooth and secure operation of modern industrial systems. By implementing strong inventory management practices, organizations can boost operational efficiency, strengthen security posture, make informed decisions, and simplify compliance efforts. As the technology evolves, the integration of AI, and advanced analytics will further improve the effectiveness of OT asset inventory management. For organizations looking to better their OT asset inventory management capabilities, Sectrio offers innovative solutions customized to the unique challenges of industrial environments. Whether you’re just beginning your asset inventory journey or seeking to upgrade your existing systems, Sectrio’s expertise can help you navigate the complexities of modern OT environments. With the right tools and partners, you can transform your asset inventory process into a strategic advantage for your organization.

The post A Comprehensive Outlook on OT Asset Inventory Management appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/a-comprehensive-outlook-on-ot-asset-inventory-management/feed/ 0 2028328
Leveraging OT Asset Inventory for Operational Excellence: The Benefits https://securityboulevard.com/2024/08/leveraging-ot-asset-inventory-for-operational-excellence-the-benefits/ https://securityboulevard.com/2024/08/leveraging-ot-asset-inventory-for-operational-excellence-the-benefits/#respond Tue, 20 Aug 2024 13:16:44 +0000 https://sectrio.com/?p=70446 To put it in simple words, it’s an all-inclusive catalog of all your hardware, software, and network components. Far from being just a list, this inventory is the backbone of efficient operations, robust security, and smart decision-making. From manufacturing plants to power grids, organizations across industries are discovering the game-changing benefits of maintaining an accurate and up-to-date OT asset inventory. Let’s explore the numerous benefits that a well-maintained OT asset inventory can bring to your organization: Enhanced Visibility and Control A complete OT asset inventory provides greater oversight of your industrial environment: Enhanced Security One of the primary advantages of having a robust OT asset inventory is the significant boost it provides to your organization’s security posture. Here’s how: Improved Operational Efficiency An accurate OT asset inventory can streamline various operational processes, leading to increased efficiency: Better Compliance Management Operating through the complex web of industry regulations can be unsettling. However, a well-maintained OT asset inventory is your compass, simplifying compliance management and reducing regulatory risks. Here’s how: Informed Decision-Making Data-driven decisions are necessary for success in modern industry. An OT asset inventory provides the insights needed for smarter, more strategic choices: Cost Savings Smart asset management translates to significant savings. A well-maintained OT asset inventory helps organizations cut costs and optimize resources in several ways: Improved Risk Management Effective risk management is crucial in industrial settings. A comprehensive OT asset inventory empowers organizations to identify, assess, and mitigate risks more efficiently: In the complex industrial landscape, an up-to-date OT asset inventory is not just a luxury—it’s a necessity. The benefits are clear: enhanced security, improved efficiency, better compliance, informed decision-making, and significant cost savings. By embracing this powerful tool, organizations can navigate the challenges of modern industry with confidence and agility. As threats evolve and regulations tighten, the value of a comprehensive OT asset inventory will only increase. Don’t let your organization fall behind. Take the first step towards a more secure, efficient, and profitable future today. Ready to transform your OT asset management? Discover how Sectrio’s cutting-edge solutions can help you build and maintain a robust OT asset inventory. Contact Sectrio now to start your journey toward operational excellence.

The post Leveraging OT Asset Inventory for Operational Excellence: The Benefits appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/leveraging-ot-asset-inventory-for-operational-excellence-the-benefits/feed/ 0 2028330
Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION https://securityboulevard.com/2024/08/texas-sues-gm-privacy-richixbw/ Thu, 15 Aug 2024 15:41:35 +0000 https://securityboulevard.com/?p=2027824 DonkeyHotey (cc:by-sa)

KP♡TX PII: “General Motors has engaged in egregious business practices that violated Texans’ pri­vacy … in unthinkable ways,” rants state attorney general Ken Paxton (pictured).

The post Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION appeared first on Security Boulevard.

]]>
2027824
August Patch Pileup: Microsoft’s Zero-Day Doozy Dump https://securityboulevard.com/2024/08/august-2024-patch-tuesday-richixbw/ Wed, 14 Aug 2024 17:32:13 +0000 https://securityboulevard.com/?p=2027632 The word “Tuesday” in cutout paper letters on a textured background

See These CVEs: Patch Tuesday—ten zero-days, seven Critical vulns, zero time to waste.

The post August Patch Pileup: Microsoft’s Zero-Day Doozy Dump appeared first on Security Boulevard.

]]>
2027632
OT Network Security Challenges and Expert Diagnosis https://securityboulevard.com/2024/08/ot-network-security-challenges-and-expert-diagnosis/ https://securityboulevard.com/2024/08/ot-network-security-challenges-and-expert-diagnosis/#respond Wed, 07 Aug 2024 09:35:38 +0000 https://sectrio.com/?p=70403 Operation Technology (OT) networks are a necessity for managing industrial processes. With time, these systems have become more complex, as a result of which network security issues are bound to arise, thus causing disruptions. It is important to diagnose these problems quickly and efficiently to keeping operations running smoothly.  This article will guide you through the process of identifying and solving common OT network security issues effectively. Common OT Network Security Issues OT networks face several security problems that can affect their performance and reliability: Outdated systems and software Many OT networks use legacy systems that lack modern security features. Older software may have known vulnerabilities that attackers can exploit.  Example: Using an old SCADA system without recent security patches Lack of network segmentation Critical and non-critical systems often share the same network This allows security issues to spread across the entire infrastructure Example: A compromised office computer gaining access to industrial control systems Weak access controls Poor password policies and inadequate user authentication. Also, lack of multi-factor authentication for critical systems. Insufficient monitoring and logging Limited visibility into network activities and potential security events. This creates difficulty in detecting and responding to threats in real-time Example: Failing to notice unauthorized changes to PLC programming Unencrypted communications Sensitive data and commands transmitted without proper protection.  Thus, making it vulnerable to interception and manipulation by attackers Example: Sending control signals to remote facilities over unsecured channels Malware threats OT networks are increasingly targeted by specialized industrial malware. It can disrupt operations or allow unauthorized control of systems Example: Stuxnet worm targeting specific industrial control systems Recognizing these issues early is a must for maintaining a smooth-running OT network and preventing more serious problems down the line. Step-by-Step Diagnosis Process A systematic approach to diagnosing OT network issues involves five key steps: A. Conduct a network inventory Identify all devices and systems Document software versions and configurations B. Perform a risk assessment Identify potential threats Evaluate potential impacts C. Analyze network traffic Look for unusual patterns or behaviors Identify unauthorized access attempts D. Review access controls and user permissions Check for unnecessary privileges Verify proper user authentication methods E. Assess system and software updates Identify outdated components Check for missing security patches Tools for Diagnosing OT Network Security Issues When basic troubleshooting doesn’t reveal the problem, more sophisticated methods can help: A. Network scanners B. Vulnerability assessment tools C. Log collections and analysis D.  Network monitoring systems These tools, when used together, offer a comprehensive approach to diagnosing and monitoring OT network security issues. They help identify vulnerabilities, detect threats, and provide valuable insights into network activities, enabling organizations to maintain a more secure OT environment. Note: Tool names are examples only. Always research and choose tools appropriate for your specific needs and environment. Best Practices for Ongoing Security Monitoring Once you’ve pinpointed the problem, it’s time to take action: A.  Regular security audits B. Continuous monitoring and logging C. Employee training and awareness These practices help maintain a proactive security posture, enabling quick detection and response to potential threats in OT networks.If you’re unsure about a fix, it’s better to consult with experts to avoid potential risks to your industrial processes. Conclusion Maintaining a healthy OT network is decisive for smooth industrial operations. Regular diagnosis and prevention of network issues can save time and money and prevent major disruptions. Always stay proactive in your network management approach. For expert help in securing and optimizing your OT network, consider reaching out to Sectrio. Our specialized solutions can enhance your network’s reliability and security.

The post OT Network Security Challenges and Expert Diagnosis appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/ot-network-security-challenges-and-expert-diagnosis/feed/ 0 2027015
PKfail: 800+ Major PC Models have Insecure ‘Secure Boot’ https://securityboulevard.com/2024/07/pkfail-secure-boot-broken-richixbw/ Fri, 26 Jul 2024 17:06:55 +0000 https://securityboulevard.com/?p=2025641 An open padlock on a PC keyboard, with the word “FAIL” superimposed

Big BIOS bother: Hundreds of PC models from vendors such as HP, Lenovo, Dell, Intel, Acer and Gigabyte shipped with useless boot protection—using private keys that aren’t private.

The post PKfail: 800+ Major PC Models have Insecure ‘Secure Boot’ appeared first on Security Boulevard.

]]>
2025641