HackDig : Dig high-quality web security articles

The IT-OT Connection: How the Two Work Together

Where hardware meets software, attackers can sneak in. More and more, threat actors are targeting Industrial Control Systems (ICS) and Operational Technology (OT). IBM X-Force found that the number of attacks against those types of assets increased by over 2,000% between 2018 and 2019, with the number of ICS and OT attacks in 2019 having eclipsed the tota
Publish At:2021-04-14 21:21 | Read:103 | Comments:0 | Tags:Application Security Cloud Security Security Services Indust

At Least 100 Million Devices Affected by "NAME:WRECK" DNS Flaws in TCP/IP Stacks

Popular TCP/IP stacks are affected by a series of Domain Name System (DNS) vulnerabilities that could be exploited to take control of impacted devices, researchers with IoT security firm Forescout reveal.Collectively called NAME:WRECK and identified in the DNS implementations of FreeBSD, Nucleus NET, IPnet, and NetX, the flaws could also be abused to perform
Publish At:2021-04-14 00:40 | Read:108 | Comments:0 | Tags:ICS/OT NEWS & INDUSTRY Vulnerabilities IoT Security

Perpetual Disruption Part 1: What is Good Cybersecurity Governance in Health Care?

Disruption means constant change. This brings benefits to businesses and can improve customer loyalty. But, the costs tend to be new and large security challenges. Which raises the question: What role does the chief information security officer (CISO) hold in this ongoing transformation? In this series, we’ll look at perpetual disruption and its
Publish At:2021-04-06 21:46 | Read:117 | Comments:0 | Tags:Data Protection Healthcare Cybersecurity Healthcare Data Hea

The Rise of Industrial IoT and How to Mitigate Risk

With the acceleration of digital transformation and convergence of IT and operational technology (OT) networks, Internet of Things (IoT) and Industrial IoT (IIoT) devices are becoming essential tools for companies in sectors including oil and gas, energy, utilities, manufacturing, pharmaceuticals, and food and beverage. Whether optimizing individual processe
Publish At:2021-04-06 12:52 | Read:136 | Comments:0 | Tags:INDUSTRY INSIGHTS SCADA / ICS IoT Security

How Can the Trucking Industry Secure Their Telematics?

The trucking sector is essential to countless other industries. Without reliable transportation, supply chains would crumble, and companies and consumers would face shortages. With so much riding on it, it’s no wonder why the industry has fully embraced technology like telematics in recent years.Telematics refers to the suite of technologies fleets use to sh
Publish At:2021-03-23 02:26 | Read:195 | Comments:0 | Tags:Internet of Things IoT IoT security telematics vehicle

Health Care Cybersecurity: Costly Data Breaches, Ensuring PII Security and Beyond

As hospitals get smarter, threat actors have more routes inside. IBM’s recent research on the health care industry shows how smart tools, which could be very valuable for today’s medical facilities, also need healing of their own. What should hospital IT security teams look out for? Our overview of the state of cybersecurity in the health c
Publish At:2021-03-22 14:53 | Read:224 | Comments:0 | Tags:Security Intelligence & Analytics Data Protection Fraud Prot

Healthcare IoT Security Firm Cylera Closes $10 Million Series A Round

Healthcare IoT cybersecurity and intelligence provider Cylera today announced that it has raised $10 million in Series A funding. To date, the company has secured $17 million in funding.Founded in 2017 and headquartered in New York City, Cylera seeks to protect both healthcare organizations and patients, providing a security and analytics platform that aims
Publish At:2021-03-18 12:17 | Read:200 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Email Security Complia

New Mirai Variant Leverages 10 Vulnerabilities to Hijack IoT Devices

Over the past month, a variant of the Mirai botnet was observed targeting new security vulnerabilities within hours after they had been disclosed publicly, researchers with Palo Alto Networks reveal.Around since 2016, Mirai has had its source code leaked online, which resulted in tens of variants being released over the years, each with its own targeting cap
Publish At:2021-03-17 10:15 | Read:233 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

OSINT tools, much more than Open Source and Intelligence – Part I

OSINT is the combination of OS(Open-Source) and INT(Intelligence) or information. OSINT is quite a crucial element in keeping tabs on the information chaos. When you talk with a hacker, his friend will be the OSINT because intelligence or Information as we put it, makes a hacker’s job easy. OSINT and OSINT tools can prove to be the best initial approac
Publish At:2021-03-17 03:25 | Read:245 | Comments:0 | Tags:IoT Security Knowledge-base Penetration Testing osint osint

Hackers Breach Cameras at Banks, Jails, Tesla and More

A US hacker collective on Tuesday claimed to have tapped into footage from 150,000 security cameras at banks, jails, schools, carmaker Tesla and other sites to expose "the surveillance state."Images captured from hacked surveillance video were posted on Twitter with an #OperationPanopticon hashtag."What if we just absolutely ended surveillance capitalism in
Publish At:2021-03-10 09:17 | Read:267 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Cybercrime IoT Security

Microsoft Expands Secured-core to Servers, IoT Devices

Microsoft this week announced Secured-core Server and Edge Secured-core, two solutions aimed at improving the security of servers and connected devices.Initially announced in 2019, Secured-core is the result of a partnership between Microsoft and hardware manufacturers, and its goal is to add a security layer that combines identity, virtualization, operating
Publish At:2021-03-03 09:35 | Read:260 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Hacking Christmas Gifts: Brushing with Bluetooth

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward thei
Publish At:2021-02-18 02:44 | Read:348 | Comments:0 | Tags:Internet of Things bluetooth gift IoT security hack

Research Shows How Solar Energy Installations Can Be Abused by Hackers

Researchers at cybersecurity firm FireEye have analyzed a gateway device used for solar energy installations, and discovered vulnerabilities that could be useful to malicious hackers.The targeted device is the ConnectPort X2e made by Digi International, a US-based company that provides IT, networking and IoT solutions for industrial, enterprise and smart cit
Publish At:2021-02-17 14:05 | Read:406 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities IoT Security hack

OWASP IoT Top 10 Series: Weak or Hardcoded Password Policy OWASP

In the last blog we had explored OWASP IoT Top 10 vulnerabilities overview, now we will explore the impact of each of these OWASP vulnerabilities on IoT technologies and product development. And today we will explore the oldest and most common mistake which is a weak password configuration in these smart internet-connected devices. When it comes to findin
Publish At:2021-02-15 01:55 | Read:398 | Comments:0 | Tags:IoT Security Knowledge-base OWASP owasp IOT top 10 OWASP Top

Autonomous Vehicle Security Firm AUTOCRYPT Raises $15 Million

Autonomous vehicle security solutions provider AUTOCRYPT this week announced that it raised another $13 million in its Series A funding round, which brings the total secured in this round to roughly $15 million.The Seoul, South Korea-based firm aims to improve the safety of transportation through securing all of the connections a vehicle makes. The company p
Publish At:2021-02-11 13:47 | Read:412 | Comments:0 | Tags:NEWS & INDUSTRY Management & Strategy IoT Security s