article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

The Last Watchdog

The findings focused on outdated software components in router firmware, across sectors from industrial operations to healthcare and critical infrastructure, highlighting associated cyber risks. Equally alarming was the widespread presence of known vulnerabilities, or “n-day” vulnerabilities, in the firmware images.

Firmware 100
article thumbnail

May Firmware Threat Report

Security Boulevard

The events also became a watershed moment, one in which cyber risk to national security fully materialized. […]. The post May Firmware Threat Report appeared first on Security Boulevard. The SolarWinds and related supply chain attacks put our government through the crucible of painful incident response and restoration efforts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 Best Cyber Risk Mitigation Tools You Should Know

Centraleyes

Cyber risk mitigation is an ongoing process that aims to reduce the impact of cyber threats on your organization. A well-crafted cyber risk mitigation plan includes: Risk Identification: Discovering vulnerabilities and potential threats to your systems.

article thumbnail

Third Party Cyber Risk is growing. Most Companies aren’t prepared.

The Security Ledger

Third party cyber risk is a growing concern for organizations, as breaches and hacks tied to third party providers and applications multiply. How do you know if your third party cyber risk management program is up to the task? Our new e-book, sponsored by CyberGRX, will help you figure it out! We Talk about Why.

article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

They’ve been quick to recognize that all too many organizations have a limited understanding about these fresh cyber risks. In one attack that drew headlines earlier this year, computer maker Asus confirmed reports that someone successfully hacked the servers that Asus used to remotely issue firmware updates to its customers.

article thumbnail

Dell new vulnerability puts over 30 million users at risk

CyberSecurity Insiders

Going with the technical terms, the vulnerability was impacting a feature called BIOS Connect that allows users to perform system recovery and update firmware by connecting the device BIOS setup with the backend servers of Dell on a remote node.

Risk 87
article thumbnail

RSA warns Digital Transformation is supercharging Digital Risk

The Security Ledger

But executives at RSA Security warn that it is also magnifying digital risk in ways that are easy to miss. Related Stories Third Party Cyber Risk is growing. Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy Huge Survey of Firmware Finds No Security Gains in 15 Years.