How a Conference Room Speakerphone Can Expose Your Corporate Network to Attackers
Researchers have identified multiple vulnerabilities in the Stem Audio Table conference room speakerphone that could be used by attackers to not only eavesdrop on room conversations, but to download malicious firmware and get into the network and gain persistence.
“Jackware,” a New Type of Dangerous Ransomware Hijacks Physical Devices
Industry experts are terming firmware attacks as “Jackware” and saying this type of ransomware is 10 times more dangerous than traditional malware because it hijacks the actual physical device or machine. This article spells out just how dangerous a firmware attack can be to critical infrastructure, heavy machinery, and medical equipment.
Firmware Security Goes Mainstream as Microsoft Acquires ReFirm Labs
Firmware attacks and industry attention to this growing problem has taken a front stage today as industry giant Microsoft, Inc announced their acquisition of ReFirm Labs to enhance IoT security. Microsoft acknowledges the growth in recent attacks and in their own research has found that over 80% of organizations reported being attacked at the firmware level in the last two years. Read how their acquisition changes the firmware security landscape today.
Officials Call for Tighter Device Security After Ransomware Attack Grips Fuel Supply
Officials say tighter cybersecurity requirements are needed across critical infrastructure to avoid ransomware attacks on critical infrastructure. Operators at chemical plants, electric grids and others are being asked to undertake a cybersecurity assessment and report to CISA within 30 days.
Looking Back at The RSA Hack 10 Years Later
The RSA breach rocked the cyber security world 10 years ago, but most people are just now coming to understand its significance. In addition to spawning 10 years of rampant state-sponsored attacks and supply chain hacks, only now can we see how this breach was both a lesson to security pros and the start of what is now the modern era of digital insecurity.
DHS CISA Launches Program to Address Vulnerabilities Below the OS
At the annual RSA conference this week DHS CISA announced a new campaign to fight vulnerabilities below the operating system citing a recent Microsoft study showing that firmware attacks are on the rise.
Cybersecurity Executive Order Focuses on ‘Zero Trust’ Environments
This synopsis overviews four critical takeaways from the recent executive order from President Joe Biden. The Colonial Pipeline attack has prompted the White House to issue a sweeping cybersecurity executive order requiring government agencies adhere to stricter policies around buying software, authentication, endpoint detection and encryption.
White House Issues Executive Order on Improving the Nation’s Cybersecurity
President Joe Biden issues comprehensive executive order on improving the nation’s cybersecurity. Read the full scope here.
Pipeline Cyber Attack Blocks Fuel Supply Across US East Coast
The Russian group dubbed “DarkSide” deployed a ransomware attack to the major pipeline supporting the US fuel supply this week, cutting off the entire fuel supply to the US East coast. The attack, dubbed one of the most disruptive digital ransom operations ever, is prompting a wake-up call across the country about the vulnerability of critical infrastructure to cyber warfare.