The industry-wide growing problem of a lack of usable scanning tools to see firmware vulnerabilities is what drove Microsoft to purchase ReFirm Labs earlier in June. Now the company is announcing how the plan to use ReFirm’s Binwalk tool to deliver Azure IoT Defender users ways to automate discovery and analysis of firmware vulnerabilities their organization has been exposed to.
Crowdstrike has found that a group of ramsomware attackers are using a flaw found in old SonicWall SRA devices to leverage zero-day vulnerabilities and gain persistent system access. SonicWall ended support on its Secure Remote Access (SRA) 4600 devices running firmware versions 8.x and 9.x in 2019 and is urging users to step up their security and check their logs for indicators of compromise.
Researchers have identified multiple vulnerabilities in the Stem Audio Table conference room speakerphone that could be used by attackers to not only eavesdrop on room conversations, but to download malicious firmware and get into the network and gain persistence.
Industry experts are terming firmware attacks as “Jackware” and saying this type of ransomware is 10 times more dangerous than traditional malware because it hijacks the actual physical device or machine. This article spells out just how dangerous a firmware attack can be to critical infrastructure, heavy machinery, and medical equipment.
Firmware attacks and industry attention to this growing problem has taken a front stage today as industry giant Microsoft, Inc announced their acquisition of ReFirm Labs to enhance IoT security. Microsoft acknowledges the growth in recent attacks and in their own research has found that over 80% of organizations reported being attacked at the firmware level in the last two years. Read how their acquisition changes the firmware security landscape today.
Officials say tighter cybersecurity requirements are needed across critical infrastructure to avoid ransomware attacks on critical infrastructure. Operators at chemical plants, electric grids and others are being asked to undertake a cybersecurity assessment and report to CISA within 30 days.
The RSA breach rocked the cyber security world 10 years ago, but most people are just now coming to understand its significance. In addition to spawning 10 years of rampant state-sponsored attacks and supply chain hacks, only now can we see how this breach was both a lesson to security pros and the start of what is now the modern era of digital insecurity.
At the annual RSA conference this week DHS CISA announced a new campaign to fight vulnerabilities below the operating system citing a recent Microsoft study showing that firmware attacks are on the rise.
This synopsis overviews four critical takeaways from the recent executive order from President Joe Biden. The Colonial Pipeline attack has prompted the White House to issue a sweeping cybersecurity executive order requiring government agencies adhere to stricter policies around buying software, authentication, endpoint detection and encryption.