IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP S.A.F.E.
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
      • AUTONOMOUS
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
    • POLICIES
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP S.A.F.E.
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
      • AUTONOMOUS
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
    • POLICIES

Article Categories: ARTICLE

ARTICLE | June 25, 2018

Cryptojacking – The Parasitical Crime

Infosecurity – Cryptojacking doesn’t destroy data. Instead, it chews up computing resources. Danny Bradbury asks whether criminals have finally found a largely victimless crime

ARTICLE | June 20, 2018

China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms

Dark Reading – Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says.

An advanced persistent threat group that is believed to be operating out of China is conducting a wide-ranging cyber espionage campaign targeting satellite, telecommunications, and defense organizations mostly in Southeast Asia and the United States.

ARTICLE | June 12, 2018

Imperva Claims About Auth0 Are Misleading At Best

Stop the presses.

Forbes – A blog post from Imperva filed under “Research” makes the breathless claim that the author was able to impersonate someone else and execute a cross-site scripting phishing scam by exploiting flaws in the Auth0 identity-as-a-service platform.

ARTICLE | June 11, 2018

Are Smart Cities a Smart Choice?

New Indian Express – Centralizing surveillance, utilities and other essential services can potentially do more harm than good.

ARTICLE | June 8, 2018

Phishing Attacks with Auth0? Facts First

Auth0 Blog – A security researcher claimed that an attacker could perpetrate a phishing scam that could target a company using the Auth0 platform based on domain. Learn about this attack, the prevalence of phishing in the industry, and how to mitigate these scams.

ARTICLE |

Hackers Can Hijack, Sink Ships: Researchers

SecurityWeek – Insecure configurations and vulnerabilities in communications and navigation systems can allow hackers to remotely track, hijack and sink ships, according to researchers at penetration testing and cybersecurity firm Pen Test Partners.

ARTICLE | June 7, 2018

Researcher Hacked In-Flight Airplanes From the Ground

24/7 Wall St. – In what may be the last thing you want to hear about today, a security researcher claims that he was able to hack into Wi-Fi networks and satellite communications (satcom) on in-flight airplanes from a position safely on the ground. Four years ago the same researcher discovered critical flaws in satcom systems that allowed attackers to invade and disrupt communications links to airplanes, ships and military operations, among other networks.

ARTICLE | June 5, 2018

Researcher Succesfully Hacked In-Flight Airplanes – From the Ground

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be ‘weaponized.’

Dark Reading – It’s been four years since researcher Ruben Santamarta rocked the security world with his chilling discovery of major vulnerabilities in satellite equipment that could be abused to hijack and disrupt communications links to airplanes, ships, military operations, and industrial facilities.

ARTICLE |

Building Apps for the Finance Industry: Benefits and Challenges

Medium – MSLDev – The finance industry cannot afford to live in the past — one mired in poor customer perceptions, fewer user-centric processes and digital channels, legacy systems, and a slow response to an ever-changing technological landscape. The industry must adapt and adopt best practices in the delivery of its service in order to meet customer needs swiftly, conveniently, and on-demand, as well as become pioneers of innovation.

ARTICLE |

Do’s and Don’ts for Protecting Your Cobots’ Cybersecurity

Blog Robotiq – Collaborative robots – more commonly known as cobots – work near people and help human employees get more done. If one or more cobots malfunctions due to a cybersecurity attack, the consequences could be dangerous and costly.

Fortunately, companies can take action to keep their cobots secure and working as expected.

 

Posts pagination

Previous page Page 1 … Page 30 Page 31 Page 32 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2026 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent.

  • SERVICES
    • Full Stack Security Assessments
    • Secure Development Lifecycle
    • Red and Purple Team Services
    • AI/ML Security Services
    • Supply Chain Integrity
    • Advisory Services
    • Training
    • OCP S.A.F.E.
  • RESOURCES
    • Blogs
    • Research
    • Disclosures
    • Library
    • Tools
  • INDUSTRIES
    • Critical Infrastructure
    • Energy
    • Financial Services
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Retail & Consumer Products
    • Technology
    • Telecommunications
    • Transportation
  • WHO WE ARE
    • Team
    • Philanthropy
    • Press
    • Events
    • Corporate Overview
    • Policies
  • CAREERS
  • CONTACT US
©2026 IOActive Inc. All Rights Reserved.
  • Privacy Policy
  • Cookie Policy
  • Terms of Use
  • Disclosure Policy