In a talk at , Sharon Brizinov and Noam Moshe from , disclosed a significant vulnerability in the Open Platform Communications Universal Architecture or OPC-UA, a univsersal protocol used to synchronize different OT devices. In…
Error Code Posts
What would happen if someone stole the encryption keys for a major satellite? Well, it’d be game over. Unless the satellite used quantum cryptography. Skip Sanzeri from QuSecure explains how using “quantum tunnels” will allow…
This is a story of what’s needed for the Capture The Flag competition at DEF CON 31 to be hosted for the first time on a live satellite orbiting 400 kilometers above the Earth. Mike…
Moonlighter is the world’s first and only hacking sandbox in space. Currently orbiting the earth near the International Space Station, the satellite is the playground for this year’s Hack-A-Sat competition at DEF CON 31. Mike…
Could a personal medical device be a threat for an organization? Turns out it’s similar to protecting against an attack on a mobile device.Except a denial of service could prove fatal. Todd Brasel, the author…
Josh Corman, VP of Cyber Safety Strategy at Claroty, is a hacker who knows public policy well. Ten years ago he created the volunteer organization I Am The Cavalry to help educate sitting legislators on…
This is the story about researchers who monitor the threats against Iot and OT systems, and the steps being taken to mitigate them. Ishmael Valenzuela, Vice President of the threat research and Intelligence Team at…
There’s a lot of FUD around hacking the power grid. Most often, there’s a more common cause: Soot. Even Squirrels. Jori Van Antwerp, CEO of SynSaber. talks about the realities of the US power grid…
How the rapid proliferation of EV charging stations is already leading to attacks on the stations and the vehicles themselves, and what we should do about it. Charles Egan, CTO of Blackberry, talks about the…