News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Vulnerabilities in medical devices
B2B Cyber ​​Security ShortNews

One in four medical devices (23%) has a vulnerability from the US cyber security agency CISA's Known Exploited Vulnerabilities (KEV) catalog. In addition, almost two thirds (63%) of KEVs are found in medical networks. In the first healthcare-focused edition of the State of CPS Security Report, Team82, Claroty's research arm, examines the impact of increasing connectivity in medical devices. The aim of the report is to demonstrate the comprehensive connectivity of critical medical devices - from imaging systems to infusion pumps - and shed light on the associated risks. As part of the investigations…

Read more

75 percent of industrial companies fall victim to a ransomware attack
B2B Cyber ​​Security ShortNews

Three out of four industrial companies worldwide fell victim to a ransomware attack last year. This is one of the findings of the new report “The Global State of Industrial Cybersecurity 2023: New Technologies, Persistent Threats, and Maturing Defenses.” The report shows that ransomware attacks are increasingly impacting OT environments. According to the latest study from 2021, 32 percent of ransomware attacks affected IT only, while 27 percent affected both IT and OT. In 2023, 21 percent of ransomware attacks were limited to IT, while 37 percent targeted both IT and…

Read more

Predictions for the security of cyber-physical systems 2024
Predictions for the security of cyber-physical systems 2024 - AI

The major geopolitical crises of the past year, such as Russia's ongoing war against Ukraine and the Middle East conflict, have also impacted cybersecurity. A security solutions provider presents its forecasts for 2024. In April, Canadian intelligence officials reported that Russian attackers appeared to have gained access to Canada's natural gas distribution network and were able to cause physical damage. And in August, Ukraine's State Security Service said that Russia's GRU military intelligence agency was attempting to use tailored malware against Starlink satellites to collect data on Ukrainian troop movements. But also beyond this political...

Read more

Outdated systems: cyber attacks on healthcare facilities
B2B Cyber ​​Security ShortNews

Globally, 78 percent of healthcare facilities were affected by cyber incidents last year. One in four cyber attacks on healthcare facilities in Germany has serious consequences for the health and safety of patients. Three out of four healthcare facilities in Germany (73%) fell victim to cyber incidents last year. The respective IT systems were “only” affected in every second case. The majority of incidents (57%) affected cyber-physical systems (CPS) such as connected medical devices or building technology. This is the result of the Global Healthcare Cybersecurity Study 2023 by Claroty, a specialist in the security of…

Read more

70 percent of XIoT vulnerabilities critical or high
70 percent of XIoT vulnerabilities critical or high

The new State of XIoT Security Report: 2H 2022 shows that 71 percent of vulnerabilities were rated with a CVSS v3 score of “critical” (9,0-10) or “high” (7,0-8,9). Almost two-thirds of XIoT vulnerabilities can be exploited remotely. Vulnerabilities in cyber-physical systems that became known in the second half of 2022 have decreased by 2021 percent since the peak in the second half of 14. At the same time, vulnerabilities discovered by internal research and product security teams have increased by 80 percent over the same period. Sharp increase in XIoT vulnerabilities This is shown by the new State of XIoT Security Report: 2H…

Read more

Researchers Discover Holey Web Application Firewalls (WAF)
B2B Cyber ​​Security ShortNews

Claroty security researchers have discovered ways to bypass Web Application Firewalls (WAF). A lack of JSON support allows attacks on potentially all providers. The providers Palo Alto Networks, Amazon Web Services, Cloudflare, F5 and Imperva have meanwhile updated their products. Security researchers from Team82, the research arm of cyber-physical systems (CPS) security specialists Claroty, have identified the possibility of a basic bypass of industry-leading web application firewalls (WAF). The attack technique involves appending JSON syntax to SQL injection payloads. Leading WAF Vendors Have Already Responded Although most database engines have supported JSON for a decade,…

Read more

Vulnerabilities in remote iBoot power distributors
Vulnerabilities in remote iBoot power distributors

This could cause power failures remotely: Team82 discovers vulnerabilities in iBoot power distribution units. Almost a third of all Power Distribution Units (PDU) that can be controlled via the Internet are devices from iBoot manufacturer Dataprobe. They are also found in powered switches. Security researchers at Team82, the research arm of cyber-physical systems (CPS) security specialist Claroty, have disclosed multiple vulnerabilities in iBoot-PDU, Dataprobe's intelligent power distribution unit (PDU). The PDUs can be managed from any location via a web-based interface or a cloud-based platform. Matching code ensures shutdown By exploiting the vulnerabilities,…

Read more

XIoT Report: over 50 percent more IoT vulnerabilities
XIoT Report: over 50 percent more IoT vulnerabilities

Team1's State of XIoT Security Report: 2022H 82 shows an increase in IoT vulnerabilities, vendor self-identified vulnerabilities, and fully or partially fixed firmware vulnerabilities. On average, 125 XIoT vulnerabilities are published and fixed per month. Disclosures of vulnerabilities in IoT devices increased by 2022 percent in the first half of 57 compared to the previous six months. This is shown by the new State of XIoT Security Report: 1H 2022 from Claroty, the specialist for the security of cyber-physical systems (CPS). In the same period, the manufacturers themselves…

Read more

Evil PLC attack: New attack technique against industrial plants

Claroty's Team82 security researchers discover new attack techniques against industrial plants: Evil PLC attack. PLCs – programmable logic controllers – or programmable logic controllers (PLCs) can trigger engineering workstations to run malicious code to manipulate processes or run ransomware. Programmable logic controllers (PLCs) are essential industrial devices that regulate manufacturing processes in all critical infrastructure areas. This makes them an interesting target for cybercriminals and state-sponsored attackers, such as the Stuxnet attack on Iran's nuclear program. Security researchers at Team82, the research arm of cyber-physical systems (CPS) security specialist Claroty, have now been able to prove that industrial control systems are not…

Read more

New cybersecurity platform for cyber-physical systems CPS
New cybersecurity platform for cyber-physical systems CPS

Claroty introduces its new cybersecurity platform for. xDome strengthens resilience, enables modernization and improves the reliability of cyber-physical systems and provides more protection in the enhanced Internet of Things (XIoT). Claroty, specialist for the security of cyber-physical systems (CPS) in industry, healthcare facilities and companies, is now bringing companies a significant increase in resilience in the operational and cyber areas with its new cloud-based cyber security platform xDome. An industry first, Claroty xDome offers the simplicity and scalability of SaaS without sacrificing the breadth and depth of visibility, protection and...

Read more