iot

Here’s Yet Another D-Link RCE That Won’t be Fixed
Richi Jennings | | D-Link, D-Link Corporation, D-Link vulnerability, D-Link zero day, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iot, SB Blogwatch
D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ...
Security Boulevard

These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER
Richi Jennings | | CVE-2024-10914, D-Link, D-Link Corporation, D-Link NAS Devices, D-Link vulnerability, D-Link zero day, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iot, NAS, network storage device, SB Blogwatch
‘Bobby’ flaw flagged WONTFIX: Company doesn’t make storage devices now; has zero interest in fixing this catastrophic vulnerability ...
Security Boulevard

Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT
In an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), […] ...

Leveraging Tabletop exercises to Enhance OT security maturity
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...
IoT Security Failures Can Be Sh*tty
It’s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different. The Register reported that in Moscow a skyscraper-high plume of ...
October Can Be Scary
Every October brings both Halloween and National Cybersecurity Awareness Month (NCSAM). Most people know about Halloween, but if you’re just coming up to speed on NCSAM here is some background. National Cybersecurity ...

How to evaluate OT security program maturity
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...

Hacked Robot Vacuums, Secret Printer Tracking Dots
Tom Eston | | credential stuffing, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Ecovac, Episodes, government, hacked, Hacking, Information Security, Infosec, Internet of things, iot, passwords, Podcast, Podcasts, printer, Printer Tracking Dots, printers, Privacy, Reality Winner, robot, Robot Vacuum, robots, security, surveillance, technology, tracking, Tracking Dots, Vacuum, Weekly Edition
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...

World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security
Jeffrey Burt | | AI, Cybersecurity, Hybrid and Emerging Technologies, iot, Quantum Computers, secure by design, World Economic Forum
The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies ...
Security Boulevard

Launching a critical infrastructure security program in 4 phases
As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and industrial control ...