Remove Cyber Attacks Remove Energy and Utilities Remove Firmware Remove Internet
article thumbnail

Industrial Switches from different Vendors Impaired by Similar Exposures

Hacker Combat

Industrial switches are made using universal firmware developed by Korenix Technology, a leading provider for industrial networking solutions based in Taiwan. SEC Consult , a cyber-security consultancy based in Austria, was the first to discover these exposures. Malicious firmware and bootloader uploads are possible too.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. Besides the obvious benefits, IoT devices create an expanded threat landscape and have already been exploited in numerous cyber attacks (e.g., The attack affected numerous U.S. Encryption.

IoT 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

Industroyer2 was discovered in the network of a Ukrainian energy provider, and it is very unlikely that the attacker would have been able to develop it without access to the same ICS equipment as used by the victim. It directly affected satellite modems firmwares , but was still to be understood as of mid-March.

DDOS 133
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

But also war over the internet. The updates are done through firmware, firmware updates that we get from the vendor. It's individual pieces of it that fall apart and become a nightmare for that company or that utility or whatever. They are found in every industry in some shape or form. Physical war. So it shouldn't be.

Hacking 52
article thumbnail

Cyber Security Roundup for March 2021

Security Boulevard

From IoT devices to internet-based services, the security of countless devices and web-based services' are dependant upon a secure Linux account privilege model. Npower removed its mobile app after an attack exposed " some customers' financial and personal information." Npower App Hack. VULNERABILITIES AND SECURITY UPDATES.