OT/IoT Security Report

OT | August 4, 2020

article image
Find out about: The OT/IoT threat landscape: IoT malware Ransomware COVID-19-themed malware The tactics and techniques of the most important threat actors The top 2020 ICS vulnerabilities and their ongoing impact on risk Recommendations for securing OT/IoT networks

Spotlight

Sensewaves

"Time-series analytics for the Internet of Things Sensewaves is the IoT signal-to-noise ratio booster. We make connected assets smarter by transforming raw sensor data into meaningful information via our web service. We complement existing IoT platforms and legacy systems providing the owners of industrial connected devices with impactful insights on their connected assets. Our solutions include predictive, behavioral, context and trend analysis for energy and lifecycle management applications. Our initial focus is in providing context-aware anomaly detection in real-time for industrial, mission-critical applications."

OTHER ARTICLES

Coronavirus malware roundup: watch out for these scams

Article | March 18, 2020

With so many of us hunting out the latest Covid-19 info, it hasn’t taken long for hackers to take advantage. So first off, a basic hygiene reminder: Don’t download anything or click on any links from unfamiliar sources. This includes coronavirus-related maps, guides and apps. Here’s a closer look at some of the specific threats that have emerged over the last week or so. The DomainTools security research team has uncovered at least one example of a coronavirus-related fake app .The Android app in question was discovered on a newly created domain, (coronavirusapp[.]site). The site prompts users to download an Android App to get access to a coronavirus app tracker, statistical information and heatmap visuals. The app actually contains a previously unseen ransomware application, dubbed CovidLock. On download, the device screen is locked, and the user is hit with a demand for $100 in bitcoin to avoid content erasure.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | May 13, 2021

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Guest Blog: Cyber security guidance for remote working

Article | March 20, 2020

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Centre) issuing warnings of such activity on a daily basis, it’s important that we all work to protect our businesses from the damage of cybercrime. As many of us move to working from home, the opportunity for cyber attacks only increases, so it’s vital that we work together with our IT colleagues to adopt good cyber health practices. If you are working from home, you should only be using a VPN (Virtual Private Network) or a secure home network with strong end-to-end encryption; e.g. Office 365 SSL session. Don’t be tempted to use public wifi, as hackers can position themselves between you and the access point.

Read More

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Article | March 17, 2020

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shift to distance working brings with it a whole new set of cybersecurity challenges. For instance, a lack of IT resources can bite many organizations as they move to enable remote strategies. And when workers and students are sent outside the normal perimeter, managing device sprawl, and patching and securing hundreds of thousands of endpoints, becomes a much a bigger challenge. Threatpost editors wanted to learn more about challenges and best practices from the IT and security professionals on the front lines of this. Please take a few minutes to take the Threatpost poll. The answers will be collected the results will be published in an article later this week.

Read More

Spotlight

Sensewaves

"Time-series analytics for the Internet of Things Sensewaves is the IoT signal-to-noise ratio booster. We make connected assets smarter by transforming raw sensor data into meaningful information via our web service. We complement existing IoT platforms and legacy systems providing the owners of industrial connected devices with impactful insights on their connected assets. Our solutions include predictive, behavioral, context and trend analysis for energy and lifecycle management applications. Our initial focus is in providing context-aware anomaly detection in real-time for industrial, mission-critical applications."

Events