Networking

Networking | News, how-tos, features, reviews, and videos

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]
change management in digital transformation internet of things iot and new technology big data and

distributed / decentralized global network / globe / Africa

New Mirai botnet variant V3G4 targets Linux servers, IoT devices

The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network’s Unit 42 team reports.

Manufacturing 4.0

PLC vulnerabilities can enable deep lateral movement inside OT networks

Researchers demonstrate how attackers can target PLCs to bypass authentication and perform remote code execution on industrial networks.

Tech Spotlight   >   Cloud [IFW]   >   Conceptual image of IoT cloud services.

Flaws in industrial wireless IoT solutions can give attackers deep access into OT networks

Greater use of industrial cellular gateways and routers expose IIoT devices to attackers and increase the attack surface of OT networks.

network security lock padlock breach

NTT, Palo Alto partner for managed SASE with AIOps

Using a managed services provider to deliver SASE can streamline deployment and free up enterprise resources.

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

IoT, connected devices biggest contributors to expanding application attack surface

New report shines light on application security challenges impacting global businesses.

metaverse

The metaverse brings a new breed of threats to challenge privacy and security gatekeepers

If your organization isn’t already moving into the metaverse, it soon will be. Be warned: today’s security protocols and privacy laws may not apply to 3D worlds.

Data center / enterprise networking

Remote.it takes steps toward zero trust with 'single line of code' provisioning

New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it’s network management platform.

cyber security concept encryption.jpgs1024x1024wisk20cfiitanrk3 vlvfuofvdrpl3edoa258hp5vdjfgmuugo

Palo Alto Networks flags top cyberthreats, offers new zero-day protections

The first day of Palo Alto's Ignite conference brings new security features, as the company releases its latest cyberthreat research.

CSO  >  Botnet  >  Robots amid a blue binary matrix

Are robots too insecure for lethal use by law enforcement?

The San Francisco Police Department wants to use weaponized robots, but some experts say robots suffer from severe security flaws that render them too dangerous for such use.

digital twins woman in profile ai mirror duplicate duo pair

The cybersecurity challenges and opportunities of digital twins

The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.

healthcare technology / medical data

Palo Alto Networks looks to shore up healthcare IoT security

Machine-learning based visibility and monitoring are at the heart of the cybersecurity company’s new healthcare-focused, add-on application to its core firewall products.

hand holding paper cloud for Microsoft Azure logo

Microsoft Azure launches DDoS IP protection for SMBs

DDoS IP Protection for SMBs is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to small and medium-size companies.

abstract industrial iot internet of things

Engineering workstation attacks on industrial control systems double: Report

Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.

CSO > global security

Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC

UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.

Tips on securing IoT devices gleaned from enterprises that use them

IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.

iot internet of things chains security by mf3d getty

Portnox adds IoT fingerprinting to network access control service

The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

cloud security

Aryaka rolls out cloud-based web gateway for SASE-focused WAN offering

Aryaka's Secure Web Gateway and Firewall-as-a-Service adds cloud-based security services to its Zero Trust WAN platform, as it moves toward providing SASE capabilities for its users.

VPN on iPhone

97% of enterprises say VPNs are prone to cyberattacks: Study

Since the shift to remote and hybrid work, 44% of organizations have witnessed an increase in exploits targeting VPNs, and many are moving toward zero-trust security, according to a report from Zscaler.

Load More
You Might Also Like