IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | June 12, 2018

Imperva Claims About Auth0 Are Misleading At Best

Stop the presses.

Forbes – A blog post from Imperva filed under “Research” makes the breathless claim that the author was able to impersonate someone else and execute a cross-site scripting phishing scam by exploiting flaws in the Auth0 identity-as-a-service platform.

ARTICLE | June 11, 2018

Are Smart Cities a Smart Choice?

New Indian Express – Centralizing surveillance, utilities and other essential services can potentially do more harm than good.

ARTICLE | June 8, 2018

Phishing Attacks with Auth0? Facts First

Auth0 Blog – A security researcher claimed that an attacker could perpetrate a phishing scam that could target a company using the Auth0 platform based on domain. Learn about this attack, the prevalence of phishing in the industry, and how to mitigate these scams.

ARTICLE |

Hackers Can Hijack, Sink Ships: Researchers

SecurityWeek – Insecure configurations and vulnerabilities in communications and navigation systems can allow hackers to remotely track, hijack and sink ships, according to researchers at penetration testing and cybersecurity firm Pen Test Partners.

ARTICLE | June 7, 2018

Researcher Hacked In-Flight Airplanes From the Ground

24/7 Wall St. – In what may be the last thing you want to hear about today, a security researcher claims that he was able to hack into Wi-Fi networks and satellite communications (satcom) on in-flight airplanes from a position safely on the ground. Four years ago the same researcher discovered critical flaws in satcom systems that allowed attackers to invade and disrupt communications links to airplanes, ships and military operations, among other networks.

ARTICLE | June 5, 2018

Researcher Succesfully Hacked In-Flight Airplanes – From the Ground

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be ‘weaponized.’

Dark Reading – It’s been four years since researcher Ruben Santamarta rocked the security world with his chilling discovery of major vulnerabilities in satellite equipment that could be abused to hijack and disrupt communications links to airplanes, ships, military operations, and industrial facilities.

ARTICLE |

Building Apps for the Finance Industry: Benefits and Challenges

Medium – MSLDev – The finance industry cannot afford to live in the past — one mired in poor customer perceptions, fewer user-centric processes and digital channels, legacy systems, and a slow response to an ever-changing technological landscape. The industry must adapt and adopt best practices in the delivery of its service in order to meet customer needs swiftly, conveniently, and on-demand, as well as become pioneers of innovation.

ARTICLE |

Do’s and Don’ts for Protecting Your Cobots’ Cybersecurity

Blog Robotiq – Collaborative robots – more commonly known as cobots – work near people and help human employees get more done. If one or more cobots malfunctions due to a cybersecurity attack, the consequences could be dangerous and costly.

Fortunately, companies can take action to keep their cobots secure and working as expected.

 

ARTICLE | May 29, 2018

It’s a Good Time to Find a Cybersecurity Job

So, you want a job in cybersecurity? Now is a good time to be looking.

Wall Street Journal – Thousands of information-security jobs are going unfilled as the industry in the U.S. struggles with a shortage of properly trained professionals. The current demand for cybersecurity workers is outpacing supply by so much that by 2022…

ARTICLE | April 24, 2018

For critical systems, “just patch it” is a paradox

The Parallax – Security patches don’t often come wearing gold-sequined tuxedo jackets, but maybe they should. If they did, everybody from consumers to security experts might pay more attention to them, and perhaps have a better understanding of why, when a vulnerability is discovered, “just patch it” isn’t exactly the answer.

Posts pagination

Previous page Page 1 … Page 30 Page 31 Page 32 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy