Do you know the top three medical devices that account for nearly 86% of all hospital security breaches? Or the common security issues that leave these devices vulnerable? Are you aware of how healthcare organizations use VLANs to secure medical
Zingbox Security Research
In the May 14, 2019 Patch Tuesday, Microsoft released a critical update to correct a remote code execution vulnerability due to improper request handling in the RDP (Remote Desktop Protocol). This vulnerability (CVE-2019-0708) does not require authentication
Since 2009, the North Korean government has launched cyberattacks targeting more than 150 countries. The U.S government refers to the malicious cyber activity by the North Korean government as Hidden Cobra. Hidden Cobra is also known as the Lazarus Group,
Mirai, first found in August 2016, wreaked havoc by taking advantage of insecure IoT devices. Hundreds of thousands of devices were enslaved to this malware, creating a massive botnet that was used to launch several crippling DDoS (distributed denial-of-service) attacks.
Zingbox IoT Guardian is the industry’s first and also the most widely deployed security and analytics platform. From its launch in 2014, we have taken a wholistic approach to device lifecycle management when securing and managing connected medical devices.
I just finished presenting at HIMSS19 Cybersecurity Command Center. As much as I hope attendees enjoyed an informative session, I personally enjoyed how much insight I took away from the audience. I wanted to take a few minutes now and
The Zingbox Security Research Team identified an IoT botnet campaign targeting Android-powered devices in November and December of 2018. The perpetrators dropped different variants that set up a backdoor to give themselves remote control of the victim and expand to
Robotic telepresence is a next-generation technology that allows a person in one location to replicate himself in another. The remote person can see you, hear you, interact with you, and move all around your location. But wait a second! What
A Hacker can learn important system and device details from the information available in error messages. By analyzing this information, the hacker can tailor the attack to exploit vulnerabilities associated with the OS and applications running on the device, greatly
As I speak with more and more customers regarding the management and security of IoT devices, it’s become abundantly clear that integration between various solutions is a critical component that’s often overlooked. That’s why I’m so excited about the Zingbox-Cisco