Managing and Securing Medical Devices through IoT

Managing and Securing Medical Devices through IoT

The value generated by data far exceeds the value of global goods trade —— McKinsey “Digital Globalization” (2016) Protect Your Devices to Protect Your Patients The quality of patient care is at the core of healthcare. In a rapidly evolving world of medical devices, software is at the center of innovation, with manufacturers shifting from … Read more

Connected Vehicle Security: How to Protect Your Car from Hacker Attacks?

Connected Vehicle Security: How to Protect Your Car from Hacker Attacks?

Word count 1425, reading time approximately 8 minutes Connected Vehicle Security: How to Protect Your Car from Hacker Attacks? With the continuous development of automotive technology, the Internet of Vehicles (V2X, Vehicle-to-Everything) has become an essential part of modern vehicles. It connects vehicles with external devices, road infrastructure, and other vehicles, greatly enhancing the driving … Read more

Linux io_uring Proof-of-Concept Rootkit Bypasses System Call-Based Threat Detection Tools

Linux io_uring Proof-of-Concept Rootkit Bypasses System Call-Based Threat Detection Tools

Recently, cybersecurity researchers demonstrated a proof-of-concept (PoC) Rootkit named “Curing” that utilizes the Linux asynchronous I/O mechanism io_uring to bypass traditional system call monitoring. 01 Significant Blind Spots in Security Tools ARMO stated that this leads to “significant blind spots in Linux runtime security tools.” In a report shared with The Hacker News, the company … Read more

The Japanese Government Begins Testing the Security of Nationwide IoT Devices

The Japanese Government Begins Testing the Security of Nationwide IoT Devices

Click Subscribe to the “IEEE Electrical and Electronics Engineers Society” by clicking above. Stay updated on global technological advancements and open your mind for research and entrepreneurship. Illustration Source:iStockphoto Since February 20, the National Institute of Information and Communications Technology (NICT) in Japan has begun testing the security of IoT devices owned by citizens and … Read more

Fundamentals: What is the Industrial Internet of Things? What is its Ecosystem?

Fundamentals: What is the Industrial Internet of Things? What is its Ecosystem?

Introduction What is the Industrial Internet of Things? What is its ecosystem? The benefits of the Industrial Internet of Things (IIoT) lie in the collection and analysis of various data. Manufacturers utilize this network to improve quality control, sustainable and green practices, supply chain traceability, and supply chain efficiency. So far, we are all familiar … Read more

Rapid Response to Malicious Code Injection Threats in Industrial Control Systems Using WebGaze Tools

Rapid Response to Malicious Code Injection Threats in Industrial Control Systems Using WebGaze Tools

One day, the cybersecurity monitoring center of an oil and gas company received a series of alarm signals indicating abnormal behavior in some of its production control systems. After a thorough investigation, it was discovered that certain critical control nodes were receiving abnormal commands from the internal network, suspected to be an external attacker attempting … Read more

Industrial Control Security | Review of the Top Ten News Events in China’s Industrial Control System Information Security in 2016

Industrial Control Security | Review of the Top Ten News Events in China's Industrial Control System Information Security in 2016

2016 was a fruitful year for China’s industrial control system information security market, especially with significant breakthroughs in relevant laws, regulations, and standards. The Industrial Control System Information Security Industry Alliance (ICSISIA) has specially compiled and published the top ten news events in China’s industrial control system information security for 2016. Let’s take a closer … Read more

Urgent Warning: Multiple Critical Vulnerabilities in RTOS VxWorks

Urgent Warning: Multiple Critical Vulnerabilities in RTOS VxWorks

0x00 Background Researchers at Armis have discovered 11 zero-day vulnerabilities in VxWorks, the most popular real-time operating system (RTOS), used by over 2 billion devices, including critical mission devices in industrial, medical, and enterprise settings. These vulnerabilities, referred to as ‘URGENT / 11′, exist in IPnet, VxWorks’ TCP/IP stack, affecting versions released over the past … Read more

Malicious npm Package Attacks Linux Developers to Install SSH Backdoors

Malicious npm Package Attacks Linux Developers to Install SSH Backdoors

Introduction A concerning new type of supply chain attack has emerged, targeting Linux developers working with the Telegram bot ecosystem. Discovered in early 2025, multiple malicious npm packages disguised themselves as legitimate Telegram bot libraries to provide SSH backdoors and steal sensitive data from unsuspecting developers. These domain-squatted packages accumulated approximately 300 downloads over several … Read more

How Flex and BMW Address ECU Validation Challenges

How Flex and BMW Address ECU Validation Challenges

BMW F48 (Image source: BMW Group website) Electronic Control Unit (ECU) certification is the future of connected vehicles—Flex and the BMW Group overcome this challenge based on Catena-X data exchange. The Engine Control Unit (ECU), also known as DME (Digital Motor Electronics) or DDE (Digital Diesel Electronics), is a critical component in automotive manufacturing. From … Read more