IoT & ICS Security
Security Vulnerability in Saflok’s RFID-Based Keycard Locks
It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...
Unsafelok Threat Highlights It’s About Both IoT Devices and Applications
IoT devices and applications exist all over the place, and in high volume. Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their ...
EPA and White House Raise Alarm on Water Cybersecurity
Iran and China fingered: Biden admin. chides governors: Water infra. lacks “even basic cybersecurity precautions.” ...
Drones and the US Air Force
Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...
Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date
Wanna be a VRP VIP? Last year, $GOOG paid $10 million to ethical hackers for finding vulnerabilities ...
Irony of Ironies: CISA Hacked — ‘by China’
Free rides and traffic jams: U.S. Cybersecurity and Infrastructure Security Agency penetrated in February, via vuln in Ivanti ...
Emerging Trends in Embedded Linux IoT Security
Mitigating potential vulnerabilities requires proactive measures due to the complexity of embedded Linux IoT devices The use of containerization and virtualization reduces the attack surface and minimizes the impact of security breaches ...
Cloudflare Unveils a Firewall Designed to Keep LLMs Safe
Cloudflare wants to help organizations wall off their large-language models (LLMs) from cyberthreats and give enterprises an AI framework to ward off risks, many of which are themselves based on the emerging ...
CISA Warns Phobos Ransomware Groups Attacking Critical Infrastructure
Phobos, a complex ransomware-as-a-service (RaaS) operation that has been around for five years and is includes multiple variants, continues to target a range of critical infrastructure in the United States, including education, ...
Cheap Video Doorbell Cams: Tools of Stalkers and Thieves
EKEN IoT FAIL: Amazon, Sears and Shein still sell security swerving stuff ...