IOActive Logo
  • BLOGS
  • contact us
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW
IOActive Logo
  • SERVICES
    • FULL STACK SECURITY ASSESSMENTS
    • SECURE DEVELOPMENT LIFECYCLE
    • RED TEAM AND PURPLE TEAM SERVICES
    • AI/ML SECURITY SERVICES
    • SUPPLY CHAIN INTEGRITY
    • ADVISORY SERVICES
    • TRAINING
    • OCP SAFE
  • INDUSTRIES
    • CRITICAL INFRASTRUCTURE
    • ENERGY
    • FINANCIAL SERVICES
    • HEALTHCARE
    • MANUFACTURING
    • MEDIA & ENTERTAINMENT
    • RETAIL & CONSUMER PRODUCTS
    • TECHNOLOGY
    • TELECOMMUNICATIONS
    • TRANSPORTATION
      • AVIATION
      • MARITIME
      • RAIL
      • VEHICLE
  • RESOURCES
    • BLOGS
    • RESEARCH
    • DISCLOSURES
    • LIBRARY
    • TOOLS
  • CAREERS
  • WHO WE ARE
    • TEAM
    • EVENTS
    • PRESS
    • PHILANTHROPY
    • CORPORATE OVERVIEW

Article Categories: ARTICLE

ARTICLE | June 5, 2023

Cybersecurity: What every business leader needs to know – Thought Leader Forum

Puget Sound Business Journal | Cybersecurity is a vital need for every business in this day and age. The threat of a cyberattack is very real and can target everyone from the smallest of businesses to the largest corporations and even governments and nonprofits. Puget Sound Business Journal Publisher and President Don Baker recently spoke with Mary Burris, owner, and CEO of SISAdmin; Kyle Jekot, Vice President and a Senior Security Business Partner with PNC Financial Services; Brian Miller, CEO of Fusion Tek; and John Sheehy, Senior Vice President of Research and Strategy for IOActive, on what business leaders need to know to protect their organizations.

ARTICLE | October 18, 2022

Police in Europe Arrest 31 for Hacking and Stealing Autos

devicesecurity.io |  Keyless Auto Theft Mounting Threat for Car Owners. Police in three European countries arrested 31 individuals involved in the keyless theft of automobiles. Included in the roundup were suspects in France, Spain and Latvia. Their number includes developers of software enabling the theft, its resellers and car thieves who used it to make off with vehicles made by two unnamed French manufacturers.

ARTICLE | September 12, 2022

New attack can unlock and start a Tesla Model Y in seconds, say researchers

The Verge | Tesla prides itself on its cybersecurity protections, particularly the elaborate challenge system that protects its cars from conventional methods for attacking the remote unlock system. But now, one researcher has discovered a sophisticated relay attack that would allow someone with physical access to a Tesla Model Y to unlock and steal it in a matter of seconds.

ARTICLE | September 5, 2022

The best Black Hat and DEF CON talks of all time

The Daily Swig | Hacker Summer Camp is only days away, so in order to whet your appetite, The Daily Swig has compiled a list of some of the best talks of years past.

Over the years there’s been thrills, spills, and (of course) ‘sploits, as the top researchers in the security world have descended on Las Vegas for Black Hat USA and DEF CON – a security double bill that’s hard to beat.

This year’s Black Hat – which is again taking place as a hybrid event – and DEF CON offerings are sure to add to the already impressive roster of ground-breaking talks from years gone by.

Now that Covid-related restrictions have largely been lifted, the 2022 edition promises to be something of a grand reopening of arguably the single most important event in the infosec calendar.

ARTICLE | August 15, 2022

The Top 50 Women Leaders of Washington for 2022

Women We Admire – The Top 50 Women Leaders of Washington for 2022. From the Pacific Ocean to snow-capped volcanic mountains, Washington is known for its spectacular beauty. In addition to its nature, the state nears the top of the list for best state economies, ranking third for economic activities. This year’s awardees are leading within some of the state’s largest industries including forestry, trade, aerospace, and agriculture. They offer significant contributions and achievements in the organizations they serve.

ARTICLE | June 28, 2022

Cybersecurity Risks: Protecting The Electric And Software-Defined Car

Forbes – “Putin is a d***head. Glory to Ukraine.” That’s what hacked electric vehicle chargers read amongst other things at disabled charging stations near Moscow recently. And as much as it brings a smile to the faces of many around the world, it highlights a point made by several researchers and developers who assembled last week at escar 2022 (a conference that focuses on deep, technical developments in automotive cybersecurity each year): automotive hacks are on the rise.

ARTICLE | March 8, 2022

Are cybercriminals waiting for an opportune time to attack U.S. trucks?

FleetOwner – After the pandemic and other problems showed vulnerabilities, hackers sponsored by nefarious states could attempt to cause more supply chain problems, cybersecurity expert warns fleets.

ARTICLE | June 2, 2021

JBS cyberattack: From gas to meat, hackers are hitting the nation, and consumers, where it hurts

CNBC – Cybersecurity is a topic that often fails to get the attention of the public until a headline hits about a company that has their personal information, including credit card and Social Security numbers, being the victim of a hack. But over the past month, a different threat has taken precedence that goes much deeper into the psyche, and everyday lives, of Americans: ransomware attacks that take down major energy and food supply infrastructure and raise fears about being able to buy key consumer commodities like gas and meat at affordable prices.

ARTICLE | May 17, 2021

Raising The Bar: The New Normal Requires Innovative New Security Technologies

Forbes – The world of technology is always evolving, and the threat landscape is continuously adapting and expanding. That part isn’t new. As with many other areas of life, though, 2020 seems to have shifted the playing field and changed the rules a bit more than usual. Privacy and security are simultaneously more crucial and more challenging than ever—which is why Intel remains intently focused on these areas.

ARTICLE | April 27, 2021

Do Cyberattacks Affect Stock Prices? It Depends on the Breach

DarkReading – A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.

Posts pagination

Previous page Page 1 … Page 5 Page 6 Page 7 … Page 34 Next page
IOActive Logo
  • NEWSLETTER SIGN UP

  • COPYRIGHT AND AI WARNING 

  • ©2025 IOActive Inc. All Rights Reserved. This website, including all material, images, and data contained herein, are protected by copyright. All rights are reserved. Content may not be used, copied, reproduced, transmitted, or otherwise exploited in any manner, including without limitation, to train generative artificial intelligence (AI) technologies, without IOActive’s prior written consent. Without limiting IOActive’s exclusive rights under copyright laws, IOActive reserves all rights to license uses of this work for generative AI training and development of machine learning language models.

    • SERVICES
      • Full Stack Security Assessments
      • Secure Development Lifecycle
      • AI/ML Security Services
      • Red and Purple Team Services
      • Supply Chain Integrity
      • Advisory Services
      • Training
      • OCP SAFE
    • RESOURCES
      • Blogs
      • Research
      • Disclosures
      • Library
      • Tools
    • INDUSTRIES
      • Critical Infrastructure
      • Energy
      • Financial Services
      • Healthcare
      • Manufacturing
      • Media & Entertainment
      • Retail & Consumer Products
      • Technology
      • Telecommunications
      • Transportation
    • WHO WE ARE
      • Team
      • Philanthropy
      • Press
      • Events
      • Corporate Overview
    • CAREERS
    • CONTACT US
    ©2025 IOActive Inc. All Rights Reserved.
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    • Disclosure Policy