Remove Energy and Utilities Remove Firmware Remove Internet Remove Technology
article thumbnail

Industrial Switches from different Vendors Impaired by Similar Exposures

Hacker Combat

Industrial switches are made using universal firmware developed by Korenix Technology, a leading provider for industrial networking solutions based in Taiwan. Korenix has developed another firmware that the organization incorporates in its JetNet industrial switches. Malicious firmware and bootloader uploads are possible too.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Digital technology and connected IoT devices have proliferated across industries and into our daily lives. Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. Internet Of Things. Critical Success Factors to Widespread Deployment of IoT. Encryption.

IoT 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution Q3 2021

SecureList

The vulnerability is in MSHTML, the Internet Explorer engine. We have seen targeted attacks exploiting the vulnerability to target companies in research and development, the energy sector and other major industries, banking, the medical technology sector, as well as telecoms and IT.

Malware 87
article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

Industroyer2 was discovered in the network of a Ukrainian energy provider, and it is very unlikely that the attacker would have been able to develop it without access to the same ICS equipment as used by the victim. It directly affected satellite modems firmwares , but was still to be understood as of mid-March.

DDOS 133
article thumbnail

Preparing for IT/OT convergence: Best practices

CyberSecurity Insiders

Modern-day industrial and critical infrastructure organizations rely heavily on the operational technology (OT) environment to produce their goods and services. However, deploying the right technologies can harness all the benefits of a converged operation without increasing the security exposure profile of the organization.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. It was all this discovery on the internet that brought me to it.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

But also war over the internet. The updates are done through firmware, firmware updates that we get from the vendor. It's individual pieces of it that fall apart and become a nightmare for that company or that utility or whatever. Technology Security. They are found in every industry in some shape or form.

Hacking 52