Robert VamosiHacking IoT Surveillance Cameras For Espionage OperationsThat camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers…Jul 10Jul 10
Robert VamosiHacking Water Systems and the OT Skills GapA critical skills gap in Operational Technology security could have a real effect on your water supply and other areas of the critical…Jul 10Jul 10
Robert VamosiRegulating OT Data Breaches And Ransomware ReportingWhen critical infrastructure is shut down due to ransomware or some other malicious attack. Who gets notified when? Chris Warner, from…Jun 7Jun 7
Robert VamosiSolving Mysteries. Saving Lives. Just Another Day with OT Incident Response and ForensicsWhen an enterprise network goes down, you call in the Incident Response team. When your SCADA goes down, who do you call …May 22May 22
Robert VamosiSecuring SCADA Systems In The CloudThis is a story about how organizations are moving their SCADA systems to the cloud and how they need to secure them …May 9May 9
Robert VamosiOutsized Kinetic Response to OT AttacksIf you knock down an email server, you could stand up a parallel server or you could find workarounds. If you knock down a factory floor…Apr 25Apr 25
Robert VamosiQuantifying Risk in IoT and OT SystemsOne of the problems with security is ROI. If I put in next gen this and next gen that and no security events happen, am I justified …Apr 18Apr 18
Robert VamosiTurning EDRs and Cloud Backups to Malicious WipersThis is the story of how a researcher turns EDRs and Cloud-based backup systems into wipers against the data they’re designed to protect.Mar 26Mar 26
Robert VamosiUsing ChatGPT To Perform Side Channel Attacks On Real HardwareThere’s a lot of talk about using AI and LLM in security. For example, could ChatGPT detect the vulnerable spots for power for analysis?Mar 14Mar 14
Robert VamosiHow Operation Volt Typhoon Shows That IoT & OT Devices Could Be Used In CyberwarfareYou might think that internet connected cameras would be limited in use by a bad actor. Actually such devices can be an entry point …Feb 27Feb 27