Cybersecurity For Connected Medical Devices

Cybersecurity For Connected Medical Devices

Historically, healthcare has been slow to implement disruptive technology tools that have transformed other areas of commerce and daily life. One factor that’s been cited for this lag is the regulation that accompanies medical products. Until recently, the US Food and Drug Administration (FDA) has required strong oversight of even small software updates proposed for medical devices.

The next VPNFilter will be using DGA

The next VPNFilter will be using DGA

The VPNFilter attack is actually quite sophisticated. The hackers might utilize a domain name generation algorithm (DGA) for the first phase in the attack. When DGA is combined with persistency on the routers and other devices, it appears that rebooting them doesn’t help mitigate communication with the C&C server. Even if the FBI successfully took down the original C&C server responsible for distributing the plug-ins and communicating with the infected devices, the devices can still use DGA to randomly generate a new host that can assert botnet control. This is the first botnet that we can say achieves persistency and is resilient to C&C server loss.

IoT Botnet Threat Evolution

IoT Botnet Threat Evolution

The Internet of Things is at the core of every enterprise in the digital disruption taking place in industry today. This is clearly shown in Industry 4.0 where IoT plays a crucial role in orchestrating the coordination efforts among people, devices, machines, systems, and entire production lines. From manufacturing and utilities to critical infrastructure and healthcare, IoT plays a critical role in predictive maintenance, resource monitoring and procurement, and operational improvements.