IoT Manufacturer Sierra Wireless Halts Production Following Ransomware Attack

IoT Manufacturer Sierra Wireless Halts Production Following Ransomware Attack

by Silviu STAHIE, from IoT Security Insights , on 25.03.2021

Sierra Wireless has revealed that it was hit by a ransomware attack that affected its internal systems and forced it to take part of its infrastructure offline and halt production. Sierra Wireless is one of the world's largest IoT solution providers, building components and devices for telecommunication terminals and machine-to-machine (M2M) products. It also makes ... The post IoT Manufacturer Sierra Wireless Halts Production Following Ransomware Attack appeared first on Bitdefender. read more

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

by Bogdan Carlescu, from Business Insights , on 25.03.2021

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NISTSpecial Publication 800-160, Developing Cyber Resilient Systems. read more

Golang Bot Starts Targeting WordPress Websites

Golang Bot Starts Targeting WordPress Websites

by Silvia Pripoae, from Bitdefender Labs , on 24.03.2021

Bitdefender researchers have identified a new version of an already-known vulnerability scanner that looks for a specific flaw in the “Ultimate GDPR and CCPA Compliance Toolkit” plugin for WordPress. Zero-day vulnerabilities get all the attention, but n-day vulnerabilities cause most security issues. These flaws are already known, and many already have patches. The problem is […] read more

Businesses! Beware The Vengeful IT Contractor!

Businesses! Beware The Vengeful IT Contractor!

by Graham Cluley, from Business Insights , on 24.03.2021

Attack wiped out 1200 of a company's 1500 Microsoft Office 365 accounts Always revoke the access rights of former employees and contractors read more

Malware Delivered Via Cloud Services Rises

Malware Delivered Via Cloud Services Rises

by Business Insights , on 23.03.2021

53% of Web traffic is now cloud-related, a 20% year over year increase. 61% of all malware is directly delivered via the cloud. Malicious Office documents represented 17% of all malware detected. read more

Attackers Could Use Vulnerability in Smart Gas Meters to Reset Them or Run Code, Researchers Find

Attackers Could Use Vulnerability in Smart Gas Meters to Reset Them or Run Code, Researchers Find

by Silviu STAHIE, from IoT Security Insights , on 17.03.2021

Security researchers have identified a couple of vulnerabilities in Schneider Electric’s PowerLogic ION/PM smart meter product line that could let attackers run malicious code or reset the meters altogether. There’s room for all devices in the IoT universe, and that includes smart speakers and gas meters. The first one is usually nice, shiny and stands ... The post Attackers Could Use Vulnerability in Smart Gas Meters to Reset Them or Run Code, Researchers Find appeared first on Bitdefender. read more

150,000 security cameras are hacked exposing jails, hospitals, and well-known firms

150,000 security cameras are hacked exposing jails, hospitals, and well-known firms

by Graham CLULEY, from IoT Security Insights , on 11.03.2021

A hacking group has gained access to the feeds of 150,000 surveillance cameras used inside businesses, schools, police departments, hospitals, and well-known companies. The security breach, which was first reported by Bloomberg, resulted in hackers being able to view live feeds of cameras managed by Verkada, a cloud-based startup which brags about using cameras to identify ... The post 150,000 security cameras are hacked exposing jails, hospitals, and well-known firms appeared first on Bitdefender. read more

Fin8 Group is Back in Business with Improved BADHATCH Kit

Fin8 Group is Back in Business with Improved BADHATCH Kit

by Victor Vrabie, from Bitdefender Labs , on 10.03.2021

Bitdefender researchers have uncovered new versions of the BADHATCH backdoor used by the FIN8 threat actor to compromise companies in insurance, retail, technology, and chemical industries in the United States, Canada, South Africa, Puerto Rico, Panama, and Italy. This new research describes the technical capabilities of a constantly-evolving threat actor and outlines the differences between […] read more

New IoT Botnet Uses Tor to Obfuscate C2 Communications, Researchers Find

New IoT Botnet Uses Tor to Obfuscate C2 Communications, Researchers Find

by Silviu STAHIE, from IoT Security Insights , on 08.03.2021

Security researchers discovered that a new variant of the Gafgyt malware is on the loose, attacking D-Link routers and a couple of other IoT devices. The most significant difference from its predecessors is its use of Tor to hide its communication with the command and control center. Malware targeting IoT devices is becoming more common ... The post New IoT Botnet Uses Tor to Obfuscate C2 Communications, Researchers Find appeared first on Bitdefender. read more

5G IoT Connections to Account for 40 Percent of all Connections by 2030, Research Shows

5G IoT Connections to Account for 40 Percent of all Connections by 2030, Research Shows

by Silviu STAHIE, from IoT Security Insights , on 03.03.2021

5G is slowly making its way onto the market, and researchers anticipate that it will account for 40 percent of all connections in 2030, according to a new study from Strategy Analytics. A driving force behind the IoT industry's meteoric rise is Internet availability and ease of use. But in many situations, that connectivity depends ... The post 5G IoT Connections to Account for 40 Percent of all Connections by 2030, Research Shows appeared first on Bitdefender. read more

<< Prev Next >>