News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

BSI study: Industrial IoT microcontrollers are vulnerable
B2B Cyber ​​Security ShortNews

The BSI publishes a study on possible attacks on microcontrollers that are installed in industrial IoT in the aviation or automotive sectors in particular. The study shows that several attacks on microcontrollers are possible, but can be prevented with the right software. The Fraunhofer Institute AISEC prepared the study "A Study on Hardware Attacks against Microcontrollers" on behalf of the Federal Office for Information Security (BSI), which presents the current status of hardware attacks on microcontrollers. Study shows attack possibilities The publication describes easy-to-implement countermeasures that can prevent many attacks or reduce the effort for…

Read more

Novel OT and IoT endpoint security sensor
Novel OT and IoT endpoint security sensor

A new OT and IoT endpoint security sensor aims to provide more security. Nozomi Networks introduces the first security sensor for this area of ​​application, which is intended to drastically reduce operational reliability. Nozomi Arc aims to be the industry's first OT and IoT sensor to bring more security to the endpoint. This sensor dramatically shortens the time it takes to develop significantly higher resilience in operational use. Nozomi Arc is designed to be automatically deployed across a large number of locations and devices wherever a business needs more visibility. The new sensor also provides important data...

Read more

OT/IoT Security Report: Botnets Attack IIoT
OT/IoT Security Report: Botnets Attack IIoT

A cybersecurity threat analysis for the second half of 2022: Cyber ​​attacks via botnets on critical infrastructures with IoT / OT continued and targeted rail transport, energy sector, manufacturing and hospitals. The latest OT/IoT Security Report from Nozomi Networks Labs reveals that wiper malware, IoT botnet activity, and the Ukraine War were major drivers of the 2022 threat landscape. As in the first half of 2022, the company's researchers have observed cybercriminals shifting their tactics from data theft and distributed denial of service (DDoS) attacks to more destructive malware. The aim here was to…

Read more

IoT: Are SASE and Zero Trust the key?
IoT: Are SASE and Zero Trust the key?

Are SASE and Zero Trust the key to secure IoT implementation in production environments? As manufacturing companies dive headfirst into smart factory initiatives, the number of IoT devices in factories, warehouses, and across supply chain infrastructure is exploding. Companies want to use the Internet of Things in various places, e.g. B. with the help of video cameras on the assembly line, temperature sensors on cooling units or telemetry sensors for the maintenance of factory facilities. But while trying to capitalize on the tremendous business benefits of intelligent devices in the industrial IoT, they must also weigh the potential risks that…

Read more

XIoT Report: over 50 percent more IoT vulnerabilities
XIoT Report: over 50 percent more IoT vulnerabilities

Team1's State of XIoT Security Report: 2022H 82 shows an increase in IoT vulnerabilities, vendor self-identified vulnerabilities, and fully or partially fixed firmware vulnerabilities. On average, 125 XIoT vulnerabilities are published and fixed per month. Disclosures of vulnerabilities in IoT devices increased by 2022 percent in the first half of 57 compared to the previous six months. This is shown by the new State of XIoT Security Report: 1H 2022 from Claroty, the specialist for the security of cyber-physical systems (CPS). In the same period, the manufacturers themselves…

Read more

Report on the state of IIoT and OT security
Report on the state of IIoT and OT security

Network and cloud security specialist Barracuda publishes its report on the state of IIoT and OT security "The State of Industrial Security in 2022". Manufacturing and health care bring up the rear when it comes to completed security projects. 800 IIoT/OT managers answered the survey. Cloud security specialist Barracuda surveyed 800 senior IIoT/OT managers worldwide about their experiences and views regarding IIOT/OT security in their companies. Barracuda presents the findings on IIoT/OT security projects, implementation challenges, security incidents and technology investments as well as topics related to cyber security risks with the current report The State of Industrial Security in 2022. KRITIS increasingly as a target of attack Critical infrastructures are increasingly being targeted by…

Read more

Cyber ​​security goes far beyond classic endpoints

Cyber ​​security: IP cameras, building access solutions, sensors on assembly lines or printers connected to the web are making the front line of companies to the Internet increasingly confusing and increasing the potential for attack. Four arguments for a "security perspective" on the Internet of Things. If you want to protect yourself against hackers from the Internet of Things, you need more information and access to the IoT hardware - through extended endpoint security. This applies to all companies - especially for production and healthcare, which integrate IoT directly and very strongly into their processes. New IoT hardware due to pandemic…

Read more

Study: vulnerable IoT in medicine, production and KRITIS
Study: vulnerable IoT in medicine, production and KRITIS

IoT Security Report 2022 uncovers significant gaps in cyber security. A study reveals many vulnerable IoT systems in the areas of medicine, production and KRITIS. Business leaders should think about increasing liability. Cyber ​​security is still thought of in silos - that is the conclusion of a study by the specialist for IoT security ONEKEY. “In many cases, companies and entrepreneurs still think in classic silos when it comes to IT security. The immediately growing risk of many different firmware versions in IoT systems is often overlooked,” warns Jan Wendenburg, Managing Director of ONEKEY. Highest IoT threat in medicine To the areas…

Read more

IoT Security Report 2022: Industrial controls at risk
IoT Security Report 2022: Industrial controls at risk

In the IoT Security Report 2022, IT experts call for a Bill of Materials (SBOM) for device software: Industrial controls, production and the smart home are often “insufficiently” protected against hackers. Experts demand proof of all software components used. Shampoo, biscuits, canned soup and medicines have one thing in common: the list of all ingredients on the package and their traceability from the manufacturer to the producer of the individual ingredient. Important smart industrial controls, intelligent production systems and devices such as routers, network cameras, printers and many others bring their firmware with the operating system and applications directly - without exact proof of the contained...

Read more

IIoT in the hacker focus: connecting IT and OT security securely
IIoT in the hacker focus: connecting IT and OT security securely

Automation and digitization of operational processes bring many advantages to medium-sized companies, for example in terms of production flexibility or pricing for the market. But the more successful a company is, the more attractive it becomes for cybercriminals, for example for attempts at blackmail with ransomware. Here it is important to securely combine IT and OT security. In terms of IT security, medium-sized companies are now well positioned. Surveys have sometimes shown that medium-sized companies in the IT security sector use up to 50 different security tools to counter all IT threats. With a well thought-out security strategy, the IT security area covers internal business processes, protects communication with...

Read more