IOT and ICS Security
Modern Strategies for IoT Device Fingerprinting
The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management ...
Security Boulevard
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril
Richi Jennings | | Anti-Terrorism, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child sexual exploitation, childpornography, Counter-Terrorism, counterterrorism, CSAM, Data encryption, E2EE, encryption, end-to-end encryption, extremism, france, ICS, ICS/SCADA systems, Pavel Durov, Privacy, Russia, SB Blogwatch, Telegram, Telegram app, Terrorgram, Terrorism, terrorist, terrorist attack, Terrorist attacks
Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize ...
Security Boulevard
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining
Wajahat Raja | | cloud-native environments, cryptocurrency mining, Cybersecurity News, GPU computational power, IoT botnet, weak SSH passwords
A new variant of the Gafgy botnet has recently been discovered by cybersecurity researchers. As per media reports, the botnet appears to be machines with weak SSH passwords for mining crypto. In ...
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent
Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program ...
A Comprehensive Outlook on OT Asset Inventory Management
Cybersecurity concerns in operational environments have also heightened the importance of asset inventory management. The November 2023 Aliquippa water plant in Pennsylvania cyberattack, which managed to access and shut down a pressure ...
Leveraging OT Asset Inventory for Operational Excellence: The Benefits
To put it in simple words, it’s an all-inclusive catalog of all your hardware, software, and network components. Far from being just a list, this inventory is the backbone of efficient operations, ...
Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION
KP♡TX PII: “General Motors has engaged in egregious business practices that violated Texans’ privacy … in unthinkable ways,” rants state attorney general Ken Paxton (pictured) ...
Security Boulevard
August Patch Pileup: Microsoft’s Zero-Day Doozy Dump
Richi Jennings | | Adobe patch, august patch tuesday, CVE-2024-21302, CVE-2024-38106, CVE-2024-38107, CVE-2024-38178, CVE-2024-38189, CVE-2024-38193, CVE-2024-38199, CVE-2024-38200, CVE-2024-38202, CVE-2024-38213, Microsoft patch tuesday, Microsoft Patch Tuesday August 2024, Patch Tuesday, SB Blogwatch
See These CVEs: Patch Tuesday—ten zero-days, seven Critical vulns, zero time to waste ...
Security Boulevard
OT Network Security Challenges and Expert Diagnosis
Operation Technology (OT) networks are a necessity for managing industrial processes. With time, these systems have become more complex, as a result of which network security issues are bound to arise, thus ...
PKfail: 800+ Major PC Models have Insecure ‘Secure Boot’
Richi Jennings | | Binarly, BIOS, BIOS update, Certificate and Key Management, hardware supply chain, key management, Key Management Problem, PKfail, Private Key Management, SB Blogwatch, secure boot, UEFI, UEFI Failing, UEFI firmware, UEFI vulnerabilities, Unified Extensible Firmware Interface (UEFI)
Big BIOS bother: Hundreds of PC models from vendors such as HP, Lenovo, Dell, Intel, Acer and Gigabyte shipped with useless boot protection—using private keys that aren’t private ...
Security Boulevard