article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. Starks Federal Communications Commission member Geoffrey Starks recently alluded to the possibility that China may have secretly coded the firmware in Huawei’s equipment to support cyber espionage and cyber infrastructure attacks. telecoms by Chinese tech giant Huawei.

Firmware 197
article thumbnail

PLC vulnerabilities can enable deep lateral movement inside OT networks

CSO Magazine

Threat groups who target operational technology (OT) networks have so far focused their efforts on defeating segmentation layers to reach field controllers such as programmable logic controllers (PLCs) and alter the programs (ladder logic) running on them. To read this article in full, please click here

Firmware 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dell launches new cybersecurity resources to enhance zero-trust adoption, cyber resilience

CSO Magazine

Dell Technologies has announced a raft of new cybersecurity resources to help customers simplify zero-trust adoption and improve their cyber resiliency. To read this article in full, please click here

article thumbnail

CVE-2019-0090 flaw affects Intel Chips released in the last 5 years

Security Affairs

A new vulnerability, tracked as CVE-2019-0090 , affects all Intel chips that could allow attackers to bypass every hardware-enabled security technology. Security experts from Positive Technologies warn of a new vulnerability, tracked as CVE-2019-0090, that affects all Intel processors that were released in the past 5 years.

Firmware 137
article thumbnail

AMD is going to patch UEFI SMM callout privilege escalation flaw

Security Affairs

AMD is going to release patches for a flaw affecting the System Management Mode (SMM) of the Unified Extensible Firmware Interface (UEFI). The vulnerability was discovered by the security researcher Danny Odler, it resides in the AMD’s Mini PC could allow attackers to manipulate secure firmware and execute arbitrary code.

article thumbnail

News Alert: Swissbit introduces small-capacity memory for IIoT, smart city applications

The Last Watchdog

Typical applications include green IIoT technologies like charging stations, smart meters, and PV inverters, for which only a small amount of memory is required to run boot software or to communicate with cloud applications. The proliferation of IIoT technologies is particularly evident in smart cities. Westford, Mass.,

IoT 139
article thumbnail

US and UK link new Cyclops Blink malware to Russian state hackers?

Security Affairs

Sandworm (aka BlackEnergy and TeleBots) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). The malware leverages the firmware update process to achieve persistence. ” Cyclops Blink is sophisticated malware with a modular structure.

Malware 99