Stealing Firmware from Over-The-Air Updates

Stealing Firmware from Over-The-Air Updates

Connected devices make up one of the largest attack surfaces on the modern Internet. Billions of devices, many with little to no consideration given to their secure operation, controlling everything from sewage treatment systems to safety-critical vehicle functions. As a result, security research on the low-level firmware that control these devices has become more important than ever. But how is a research to get access to closed-source firmware for proprietary hardware to begin with? One method that we have been using for some ongoing research is intercepting firmware from updater apps that use Bluetooth to perform over-the-air updates.

Read More
A New Approach to Cyber Crisis Management

A New Approach to Cyber Crisis Management

 
As a Senior Crisis Consultant in the cybersecurity industry, I see a shift in how organizations prepare themselves for a potential cyber crisis. Traditional risk assessment methods are no longer sufficient. They often result in measures only being taken for the most likely incidents.
However, it is usually events considered unlikely that cause the greatest impact, for which organizations are not prepared. Regulators recognize this, so here is my wake up call: prepare for the WORST…
I see two big challenges organizations face:

Determining what the worst case scenario could be and to what extent you should prepare.
Linking the technical, operational and tactical response to strategic crisis management.

Let’s look at how you can start to tackle these challenges.

Read More
X