We're so pleased that Neil Tyler from New Electronics has covered our 2024 Security Report! The AI-security lag is growing and this article is a great example of how the industry needs to close the lag and secure the future of the ecosystem. Read the article: https://lnkd.in/eeSSRdcg Download the report: https://lnkd.in/eTq8vSfj
PSA Certified’s Post
More Relevant Posts
-
Can Pagers, Walkie-Talkies, and Phones Explode All at Once? 💥 In my latest article, I dive deep into a mind-boggling possibility—coordinated explosions of everyday devices! 🚨 🔍 I explore: These explosions might happen through supply chain attacks, Trojan malware, and advanced tech. What are the hidden tactics behind these attacks, and why might they have been around for years? The strategic implications for governments and why we need better digital security measures. Are you curious about the tech behind this? 🤔 Check out the full article to understand how this could change our thinking about device security! 🔗 https://lnkd.in/dTczYjRp
How Recent pagers and other device explosions Have Left Us All Wondering: Is This Even Possible?
medium.com
To view or add a comment, sign in
-
In this article, we’ll dive deep into the world of SoC (System on a Chip) and explore its vulnerabilities. #cybersecurity https://lnkd.in/gFXe5mPM
Exploring System on a Chip (SoC) Vulnerabilities - Blue Goat Cyber
https://bluegoatcyber.com
To view or add a comment, sign in
-
Special Report: A combination of increasingly complex designs, more connected devices, and a mix of different generations of security technology are creating a whole new set of concerns about the safety of data nearly everywhere. While security experts have been warning of a growing threat in electronics for decades, several recent fundamental changes elevate the risk. By Adam Kovac. https://lnkd.in/eYKkcM-X #datasecurity #cybersecurity #GenAI #hardwaresecurity #RootOfTrust David Maidment Arm Infineon Technologies Mike Borza Synopsys Inc Siemens EDA (Siemens Digital Industries Software) Lee Harrison Cycuity Jason Oberg TXOne Networks Jim Montgomery Microsoft
Securing The World’s Data: A Looming Challenge
https://semiengineering.com
To view or add a comment, sign in
-
Nokia and NL-ix have achieved a major milestone by deploying Nokia Deepfield Defender across NL-ix’s network, making it the largest anti-DDoS solution for an internet exchange point (IXP) environment in Europe. This state-of-the-art solution, powered by AI-driven big data analytics, will offer unparalleled protection against DDoS attacks, enabling faster mitigation directly on Nokia FP5-based routers, with minimal impact on customer traffic. By integrating Deepfield Defender, NL-ix can provide a secure, low-latency DDoS defense solution that ensures zero downtime for enterprises, without the need for a remote scrubbing center. This deployment underscores NL-ix’s position as a key innovator in Europe, making it a “one-stop-shop” for both connectivity and security services across the continent. Jan Hoogenboom, CEO of NL-ix, emphasized the importance of this solution in maintaining low latency and cost-effective protection. Jeff Smith VP & GM of Nokia Deepfield, added that this AI/ML-driven platform, coupled with Nokia's patented Secure Genome®, will enhance protection for enterprise customers while improving scale, security, and automation. #CyberSecurity #DDoSProtection #Telecom #NetworkSecurity #Innovation #AI
To view or add a comment, sign in
-
Security around edge computing is challenging, especially when deploying hundreds or thousands of devices. At SpectroCloud, we talk about security from silicon up through the app layer, and it all starts by securing those devices when they’re most vulnerable—the moment they boot up.
Honey, I Secured Your Boot: Edge Trusted Boot with Kairos
https://thenewstack.io
To view or add a comment, sign in
-
Enterprise System Architect👷 🏗/ IT Consultant / lean / agile/ ScrumMaster at Independent Consulting / Mentor / Mentee / #tribeOfMetors / #purpleSquirrel 🐿️
🚨🗽 #amd #cpu #defcon24 #sinkclose #Exploits ⚠️ New AMD Flaw: SinkClose opens the door to Undetectable #Malware ⚠️ #infosec #ciso #cso may have a bad day come Monday , as I am willing to bet tickets 🎫 to Computer, OEMs and cloud, OEMs will be fast and furious. Come Monday. A newly discovered vulnerability in AMD processors, dubbed SinkClose, is raising serious concerns in the #cybersecurity community. This flaw could allow attackers to bypass security measures and install malware that operates completely under the radar. ⚫️Key 🔑 points 🤺 / Pillars 🏛️ 🔴/Vulnerability: SinkClose (CVE-2023-31315), discovered by IOActive researchers 🔴/Severity: High (CVSS score: 7.5) 🔴/Impact: Privilege escalation to Ring -2, the highest privilege level, enabling the installation of virtually undetectable malware 🔴/Affected Processors: A wide range, including EPYC, Ryzen, Threadripper, and more 🔴/Exploitation: Requires kernel-level access, but sophisticated attackers have demonstrated the ability to achieve this 🔴/Mitigations: Available for some processors, but others are still awaiting fixes ⚫️But what is the threat about??? SinkClose exemplifies the ever-present threat of hardware vulnerabilities. Even with the most robust security software, a #vulnerability, whether known or unknown, can expose systems to sophisticated attacks. The potential for undetectable #malware is a chilling prospect, and the stakes are high. ⚫️What to Do 🔴/Get inventory of your machines to determine whether or not they are affected , how good is you cmdb or Ansible/ ssh 🔴/Apply available confirmation from hardware vendors via ticket that these mitigations from AMD should immediately work 🔴/Stay informed about further developments and updates. 🔴/Maintain a strong security posture with robust endpoint protection and threat detection. Alexandre BLANC Cyber Security Andrew A. Anthony Orbanic Brett Johnson BreachAware® Charles Durant Doowan Lee Randy B Garett Moreau 🇺🇸 Gregory Kurtzer Gloria D'Anna Dr. Fatih Tekin WILLIAM SLATER 🥋Yes, this is #yuge TBD on 3rd Party risk Gerry Kennedy
Coder | Cyberpunk | Threat Intelligence Advisor | RedTeam Lead | Offensive Security Manager | Cyber Threat Intelligence Investigator & CIO @ LEX
Exploit targeting the depths! This hole involves AMD chips. It comes from DEFCON. While DEFCON continues, let’s discuss the global threat that a particular finding could pose and how this vulnerability could be used for mass surveillance within the framework of other national security units. I will talk about Sinkclose. - The Sinkclose works by exploiting an obscure feature of AMD chips known as TClose. In AMD-based machines, a security measure known as TSeg prevents writing to a protected memory section reserved for the System Management Mode of the computer's operating systems, known as System Management Random Access Memory or SMRAM. However, AMD's TClose feature is designed to allow other memories to be remapped to these SMRAM addresses when enabled, keeping computers compatible with legacy devices using the same memory addresses as SMRAM. It was discovered that by using the TClose remapping feature, they could cause SMM code to access the tampered data, thereby redirecting the processor to execute their own code at the same high-privilege SMM level. The technique is very comprehensive. But let me summarize briefly: - The thief who enters your house has been hiding underground since the construction of your house and when the thief finds the opportunity, the thief can enter your house and easily bypass all security steps. The interesting part is that the actions associated with this vulnerability have been known to the chip manufacturer for years. This is a vulnerability that targets the chips directly, rather than the standard setups of these machines, and everything starts at the kernel level. Let me give you a recent example: - The "unshakable trust" gained by Crowdstrike led to a global internet outage through a series of update mechanisms that provided some kind of kernel access. Operating system manufacturers allow certain vendors kernel-level access for both political and commercial reasons, and often these kernel accesses are not controlled unless triggered by a significant event, with the initiative given to third parties. The real brainstorming question is: - We know that many actions have been taken at the kernel level and under the backdoor principle by the NSA and similar security units in the past. As standard surveillance methods were exposed by independent researchers, deeper methods were developed, and data was collected from the public in this way. It is recommended that you read previous cases involving chips and security units. This possibility of a backdoor directly dependent on the chip is now also applicable to AMD. Has this vulnerability been used by security forces and nationally supported APTs before? Nations need to conduct this research internally, because it could also turn into a national cyber espionage story. We'll see. As a note in history, cyberpunks! ^-^/ #freedomofinternet #cybersecurity #dataprivacy #privacy #informationsecurity #privacy #internet #amd #threatintelligence #threathunting
To view or add a comment, sign in
-
Are you a CTO or security leader within an ISP or telecoms operator? Then you'll find our upcoming on-demand webinar useful 💡 || Bookmark this date: 3 July 2024 || What's covered: We understand that balancing robust security with smooth network performance is no easy feat. And let’s be honest; integrating new security solutions into your existing architecture can feel like a daunting task. We’ve collaborated with Mercku, a leading designer and manufacturer of smart Wi-fi devices, to present a panel discussion, where Mark Mullings, Paul Hague and Paul Jenkins from BlackDice will explore how you can address these challenges head-on. Key discussion topics: → How to integrate new security solutions with your existing infrastructure → Strategies for advanced threat detection and automated remediation → How our solution integrates with your existing SOC tools → Insights into scalable security solutions for growing networks Click below to register your interest ⤵ https://lnkd.in/g7xVPjHg In collaboration with: Mercku Andrii Konovalenko 🇺🇦 Temirlan Toktabek Erik Ackner #Cybersecurity #Webinar #AI #Smartrouters
To view or add a comment, sign in
-
What could you do with the power of three?
Good things come in 3's. 🤞 And on the third wave of application transformation came AI-powered applications. SVP and GM of Network Security Anand Oswal addresses the challenges of AI adoption in enterprises, emphasizing the need for holistic security against threats from unmanaged devices. Get the details. https://bit.ly/3VmjRet
To view or add a comment, sign in
-
Emphasizing the need for holistic security against threats from unmanaged devices.
Good things come in 3's. 🤞 And on the third wave of application transformation came AI-powered applications. SVP and GM of Network Security Anand Oswal addresses the challenges of AI adoption in enterprises, emphasizing the need for holistic security against threats from unmanaged devices. Get the details. https://bit.ly/3VmjRet
To view or add a comment, sign in
-
Building and growing teams and solutions that impact the future. Delivering exceptional customer experience. Driving change through innovation. Inspiring and coaching others to dream more and do more. Sharing W-Ezz-dom.
Lenovo and SentinelOne are bringing AI-powered endpoint security to millions of Lenovo devices across the globe! #Sentinelone #SentinelLabs #cybersecurity #security #datasecurity #internetsecurity #networksecurity #identitysecurity #cloudsecurity #containersecurity #securityawareness #cybercrime #malware #cyberattacks #cyberdefence #ethicalhacking #EDR #NDR #XDR #AI #digitalsafe #cybersafe #Cloud #containers #kubernetes #infosec #hacking #privacy #cyberdeception #deceptiontechnology
🚀 💻 Lenovo and SentinelOne are joining forces to revolutionize PC security, bringing AI-powered endpoint security to millions of Lenovo devices across the globe! Lenovo will include SentinelOne’s industry-leading Singularity™ Platform and generative AI capabilities (Purple AI) in new PC shipments as part of this multi-year collaboration, as well as offer upgrades to existing customers to expand its ThinkShield security portfolio and autonomously protect devices from modern attacks. 🗞️ To learn more, read our press release: https://s1.ai/Lenovo-PR
To view or add a comment, sign in
2,445 followers