IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | December 16, 2019

Firm Analyzes China, Russia-based Supply Chain Risks of Electronic Voting Machines

SecurityWeek – Study Aims to Show Links Between U.S. Voting Infrastructure and Nations With a Proven Aptitude and Desire to Target Elections. The supply chain is an increasing concern for both business and government. It comprises the chain of suppliers providing components to product vendors — and globalization has made it worldwide, deep and complex. “Some of the software and hardware components are developed in eastern Europe. We need to look at supply chain integrity, end to end,” said Matt Rahman, COO.

ARTICLE | December 2, 2019

6 IoT Security Predictions for 2020

IoT World Today – As we transition to a new decade, there is growing maturity in the field of IoT security, but also a wave of new risks. Cesar Cerrudo, chief technology officer at IOActive, warned, “Anytime we have more interconnected things, we have more security problems.”

ARTICLE | November 21, 2019

French Hospital Crippled by Ransomware

Infosecurity Magazine – Patient care at a large hospital in northern France has suffered considerably after a major ransomware attack at the weekend, according to local reports. “Sadly, the targeting of hospitals with ransomware is a growing trend; earlier this year seven hospitals in Australia were also impacted by ransomware,” argued Cesar Cerrudo, CTO at IOActive.

ARTICLE |

Bon sang! French hospital contracts 6,000 PC-locking ransomware infection

The Register – “Sadly, the targeting of hospitals with ransomware is a growing trend; earlier this year seven hospitals in Australia were also impacted by ransomware. Hospitals are becoming a major target as despite new technology adoption being high, there is often a lack of cyber security knowledge, even though health data can be a very lucrative area for cybercriminals. This makes busy hospital staff the perfect targets.”

ARTICLE |

French Hospital Hit By Ransomware Attack

Information Security Buzz – The Rouen University Hospital has been paralyzed by ransomware, with an attack similar to WannaCry in 2017, putting lives at risk. Sadly, the targeting of hospitals with ransomware is a growing trend; earlier this year seven hospitals in Australia were also impacted by ransomware. “It is vital that there is greater education and that organisations do more to test their defences against hackers,” commented Cesar Cerrudo, CTO.

ARTICLE | November 8, 2019

2020 Predictions: Interest In Secure Design Practices Is Increasing Leading To Two Predictions

VMblog – There exists a trend towards heightened awareness in secure design practices, particularly, the attack and defense analysis technique, threat modeling. This trend implies two predictions for 2020 and beyond. First, security practitioners will need to understand DevOps software development practices to ensure that security can be designed into software from the start within a DevOps process. DevOps offers developers enormous productivity and operational gains.

ARTICLE | November 1, 2019

How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips

Forbes – Just because you’ve invested in a smartphone that isn’t exposed to quite the same degree of malware and exploit issues as an Android device, that doesn’t mean you can safely ignore good practice when it comes to iPhone security. This is why I’ve asked 12 security experts to share their knowledge as far as keeping your iPhone secure is concerned. Here are their 26 tips to help you do just that.

ARTICLE | October 31, 2019

We shall not pay the ransom, Johannesburg tells hackers

Coingeek – We shall not pay the ransom. This is the message that the city of Johannesburg in South Africa has for hackers who breached their systems. The hackers demanded 4 BTC, worth about $30,000, threatening to leak sensitive information if their demands were not met. They even gave the city a deadline. However, Joburg isn’t about to surrender to the crooks, despite admitting that some of its most crucial systems had been hit.

ARTICLE | October 30, 2019

City of Johannesburg, on Second Hit, Refuses to Pay Ransom

ThreatPost – The city of Johannesburg, South Africa, is refusing to pay a ransom of four Bitcoins to a hacker group who accessed the city’s network and stole sensitive data, threatening to release it if the ransom wasn’t paid.

It’s the second time in several months that the city has been hit with a cyberattack demanding ransom. In July, a ransomware attack on Johannesburg’s City Power, which is owned by the city itself, left some residents without electricity for days.

ARTICLE |

Scientists reveal the 13 dark technology scenarios that keep them up at night

Business Insider –  Deepfakes are sophisticated video forgeries in which AI tools can replace people’s faces in a video. For the most part, deepfakes are malicious, often used to fabricate videos like revenge porn. The technology — which is already free and easy to use — is only getting better.  Matt Rahman, COO of the computer security company IOActive, said he is especially interested in the dangers of deepfakes. “In a few years, you won’t be able to tell what’s fake,” he said, because such video will be indistinguishable from reality.

Posts pagination

Previous page Page 1 … Page 11 Page 12 Page 13 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy