Blogs
- 03 maja 2017Industrial routers can be used to gain access to robot controllers and other industrial machines. Having them exposed can lead to serious consequences for organizations and businesses.
- 31 stycznia 2017What makes routers susceptible to attacks? Users normally overlook the important fact that their routers serve as entryways to all connected devices.
- 14 grudnia 2016The emergence of IoT botnets brought to the fore the importance of securing IoT devices and routers. These devices can turn into zombies and become part of the botnets, which can then be used to perpetrate DDoS attacks.
- 08 sierpnia 2016By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions.
- 17 maja 2016Do cybercriminals use offshore companies to hide ill-gotten gains? A look into various underground communities show that these services are being offered to cybercriminals too.
- 11 kwietnia 2016A JavaScript hosted on compromised sites can exploit a vulnerability in ZTE modems. Learn how this flaw can be used to attack routers and other connected devices.
- 07 marca 2016Pawn Stormpawnstorm, the long-running cyber espionage campaign, added several government offices and one of the largest newspapers in Turkey to its long list of targets.
- 01 marca 2016The global cybercrime underground mirrors the globe: it's made up of a patchwork of different countries and unique cultures. See how the cybercrime underground markets truly differ.