Author: Jeff Horne

A Primer on Preparing for and Responding to Ransomware for Users of IoT and IoMT

The COVID-19 pandemic is one of those black swan events that is beyond the scope of normal contingency planning and has unpredictable, long-lasting, and highly disruptive consequences. Yet amid the chaos, one thing has been completely predictable: malicious actors quickly exploiting the panic. Not long after emergency orders were issued and the healthcare industry was…

Read More

Detecting and Mitigating Ripple20 Vulnerabilities

JSOF recently published information on 19 vulnerabilities they found in the Treck TCP/IP stack used by many device manufacturers that enables their devices to communicate over a network. The vulnerabilities were originally discovered in September of last year. While there is no indication that these vulnerabilities have been exploited in the wild, any threat to…

Read More

Security Best Practices for Working From Home

In the last couple of weeks, most organizations have transitioned to a work-from-home model for the majority of employees. Unfortunately, we’ve seen a rise in cyberattacks such as Coronavirus-themed phishing attacks and ransomware by hackers taking advantage of these circumstances. It’s important to be extra vigilant as this may be the defacto work mode for…

Read More