FiberHome Routers Plagged with Vulnerabilities and Backdoors

FiberHome Routers Plagged with Vulnerabilities and Backdoors

FiberHome Networks is a major player in telecommunications and networking equipment for the Chinese market and trade allies, with hundreds of thousands of customers using their routers worldwide. There’s plenty to tell about this company but today’s news is regarding the worrisome finding of at least 28 backdoor accounts and other severe vulnerabilities in the […]

A Step Closer: A Desalination Mystery Solved Aims to a More Accessible Process

A Step Closer: A Desalination Mystery Solved Aims to a More Accessible Process

Access to safe drinking water is one of the biggest challenges that humankind faces. We don’t only have large populations in Africa that don’t have access to safe drinking water but there are new problems looming in the horizon. Pollution, climate change, and exponential population growth, especially in poor regions of the world, are threatening […]

Florida Water Treatment Plant Hacked in What Could Be a Tragic Event

Florida Water Treatment Plant Hacked in What Could Be a Tragic Event

At Julie Security, we have addressed the scary possibility of utility companies getting hit by cyberattacks and the potential impact on society at large.  Fortunately, many organizations out there make good use of the security technologies available to them, protecting their infrastructures, and such attacks don’t get to become fruitful. Yet, we sometimes see episodes […]

Massive IoT: NB-IoT or Cat-M1?

Massive IoT

Massive IoT deployments are the future. Most modern organizations know that digitization is essential for staying competitive and agile. IoT is rapidly approaching the point of moving beyond testing stages in a few operations to being used across sectors on a significant scale. Organizations have several choices available when it comes to connectivity in Massive […]

Risks of Centralized Management in Building Control

Risks of Centralized Management in Building Control

Centralized building control allows organizations to achieve new levels of efficiency and productivity. And while centralizing these processes is something desirable, it comes with risks. It’s common practice to seek centralized authority in building control, putting one device in charge of many others to accomplish greater efficiency. That is what, for example, Delta’s enteliBUS manager […]

Overcoming Common Mistakes to Protect Remote Desktop Protocol

Overcoming Common Mistakes to Protect Remote Desktop Protocol

Remote Desktop Protocol, also known as RDP, is a widely-used protocol developed by Microsoft that allows us to connect to and control other devices in the network. Its graphical interface and powerful capabilities have allowed RDP to become a standard in the industry, being used by countless organizations and professionals to keep operations up and […]

Understanding the Attacker’s Criteria When Choosing their Strategies

Understanding the Attacker’s Criteria When Choosing their Strategies

When we plan and implement a cybersecurity strategy, are we taking enough time to think about how hackers are actually plotting their attacks? Probably we don’t do it enough, considering how the cybersecurity panorama looks right now. Understanding the enemy’s criteria when he is laying the groundwork is key for us, cybersecurity professionals, to be […]

Supernova Malware Suggests Second Actor in SolarWinds Cyberattack

Back in December 2020, the SolarWinds cyberattack blew up with FireEye’s statements on the hack. Since then, it has been publicly shared that a single, Russia-based actor was responsible for the large-scale attack which damage we are still measuring. However, new evidence suggests that there probably was a second yet unrelated actor targeting, with great […]

Survey Shows High Incidence of Nation-State Cyberattacks on ICS Security

Survey Shows High Incidence of Nation-State Cyberattacks on ICS Security

Nation-state attacks are stealing the spotlight after the massive SolarWinds incident that is still under development. This is a new era for cybersecurity and every single professional in the industry must be aware of the implications of this kind of threat. For those who don’t know the concept, nation-state attacks are cyberattacks carried out by […]