IoT Insider Newsletter | July 2024 Edition
Image by Antoinette Hodes via Microsoft Designer

IoT Insider Newsletter | July 2024 Edition

Welcome to the July 2024 edition of IoT Insider, your go-to source for the latest news and trends in the world of Internet of Things. In this edition, we bring you a curated selection of news and regulations to keep you informed and empowered in the digital age.


1.??? Cyber Threats on the Rise | Protect Your Digital Fortress!

As technology advances, so do the risks. We highlight the latest cyber threats making headlines, from sophisticated ransomware attacks to data breaches affecting millions.

Forescout Research–Vedere Labs examined nearly 19 million devices to determine which categories represent the greatest risk to organizations. It emphasizes the shift within the cyber threat landscape, as IoT vulnerabilities have surged by 136%, representing a growing challenge for cyber defense. Here is a break down per category

i. IT | Riskiest devices are: routers and Wireless Access Points (WAP), server, computers and lastly hypervisors

ii. IoT | Riskiest devices are: Network-Attached Storage (NAS), VoIP, IP cameras, printers and Network Video Recorder (NVR)

iii. OT | Riskiest devices are: Uninterruptible Power Sources (UPS), distributed control systems (DCS), PLCs, robotics and building management systems (BMS).

iv. IoMT | Riskiest devices are: medical information systems, electrocardiograph machines, DICOM workstations, picture archiving and communication systems (PACS) and medication-dispensing systems.

Other attacks, hacks and breaches:

  • Ransomware hackers steal records of 300 million patient interactions with NHS
  • A software vulnerability in Ariane Systems' kiosk platform allows attackers to access the personal data of hotel guests through check-in terminals equipped with the software.
  • The recently patched Vision Pro vulnerability was classified by Apple as a DoS issue, but research has shown that it’s a ‘scary’ bug.
  • Vulnerabilities on GE HealthCare Vivid Ultrasound could allow malicious insiders to locally install ransomware, access and manipulate patient data
  • Siemens informed customers that?updates?released for its Sicam A8000 remote terminal unit, Sicam EGS grid sensors, and Sicam 8 power automation software address two high-severity and one medium-severity flaws. One of the security holes, CVE-2024-31484, is a buffer overread issue that can be exploited to read sensitive data from memory, which can lead to arbitrary code execution in the context of the current process or to a denial-of-service (DoS) condition. The second vulnerability, CVE-2024-31485, is a command injection issue in the products’ web interface. It allows an attacker to intercept the username and password of users with elevated privileges, enabling them to execute arbitrary code as root.
  • Rockwell Automation informed customers that it has patched three high-severity vulnerabilities in its FactoryTalk View Site Edition (SE) HMI software.
  • CISA has notified RAD after finding a PoC exploit targeting a high-severity vulnerability in an outdated industrial switch.
  • Chip giant AMD has launched an investigation after a notorious hacker announced selling sensitive data allegedly belonging to the company. IntelBroker posted screenshots of some of the stolen AMD credentials on BreachForums, a platform where users share hacking tools and illicitly obtained information on the Dark Web.

Healthcare under attack:

Telcos, ISPs and Service Providers under attack:

Critical Infrastructures, manufacturing, OT under attack:


2.??? Global Cybersecurity Regulations | Navigating the Compliance Maze

Governments worldwide are tightening their grip on cybersecurity regulations. Stay updated on the latest compliance requirements, privacy laws, and data protection regulations that can impact businesses and individuals alike. We decode complex jargon and provide practical insights to help you navigate the compliance maze effortlessly.

  • CDK Cyberattack Exposes Gaps in Cybersecurity Regulations. The ongoing CDK Global hack that took down car dealerships across the country, is the latest example of how a lack of comprehensive federal cybersecurity regulations is affecting how companies respond to ransomware attacks. CDK, which provides software to car dealerships, was hit by a ransomware attack orchestrated by the BlackSuit group.
  • NCSC and ABI publish cyber ransom payment guidance. In collaboration with the Association of British Insurers (ABI) and other members of the cyber insurance industry, the NCSC has published?guidance?for organizations considering payment in ransomware incidents. The NCSC highlighted that payment of a ransom does not guarantee data recovery nor will it protect an organization against future attacks. In addition, it does not fulfil an organization's regulatory obligations, with the ICO not considering a payment to criminals as a risk mitigation factor such that it would not reduce any penalty for the personal data breach as a result. As ransomware attacks become increasingly common, organizations should ensure that they have strategies in place so that they are prepared for these incidents.
  • The Biden administration outlined a?comprehensive plan Tuesday to harmonize?a bevy of federal, state and international regulations?designed to boost cyber resilience among the nation’s private sector and critical infrastructure providers.?Industry stakeholders want the administration to simplify the reporting process to cut back on duplicative disclosure requirements.
  • EU Commission seeks feedback on draft implementing act under the NIS2 Directive
  • EU Commission to invest over €210 million in cybersecurity, digital capacities and technology under the Digital Europe Programme.???? ?


4. Expert Interviews | Insights from Cybersecurity Gurus

Gain exclusive access to interviews with industry experts, thought leaders, and cybersecurity gurus. Uncover their strategies, predictions, and best practices to protect yourself, your organization, and your loved ones from the ever-evolving cyber landscape. Stay updated on emerging trends, emerging threats, and expert tips to stay cyber resilient.

Learn more about industrial cybersecurity from Daniel Ehrenreich via this video. Get familiar what it is all about, what we need to prevent cybersecurity threats and how keep our industrial realms safe. Thanks Daniel and keep on sharing your valuable knowledge!


5. Cybersecurity Awareness Corner | Empowering You with Knowledge

Knowledge is power! Our cybersecurity awareness corner equips you with practical tips, best practices, and actionable advice to enhance your online safety. Learn how to spot phishing attempts, secure your passwords, protect your personal information, and stay safe in the digital world. Be the cybersecurity champion your friends envy!

Want to learn more about IoT? Check out this course “Introduction to Internet of Things and Cloud” or follow this class from Stanford University “Secure Data Science on the Internet of Things

We hope you find this edition of The IoT Insider both informative and engaging. Stay tuned for more exciting updates in the next edition, where we'll dive deeper into the world of cybersecurity. Remember, vigilance and knowledge are key to staying safe in our interconnected world.

Stay secure, stay informed, and stay one step ahead!


John Kwarsick

Dynamic Sales Leader Specializing in Cybersecurity, Cloud Solutions, and Building High-Performance Teams

4 个月

Love this Antoinette Hodes! Keep up the outstanding work!

要查看或添加评论,请登录

社区洞察

其他会员也浏览了