RBSโs Satellite 2022 Conference quick take on cybersecurity: Increasing urgency, few immediate solutions
The Ukrainian conflict amplified serious questions about satellite security in this yearโs conference. But questions arenโt action, which is needed now to protect this critical industry.ย The Ukrainian conflict amplified serious questions about satellite security in this yearโs conference. But questions arenโt action, which is needed now to protect this critical industry.ย The Ukrainian conflict […]
Adventures of Captain Obvious Issue #24.2
ADVENTURES OF CAPTAIN OBVIOUS ISSUE #24.2 The Cybersecurity Chronicles: Red Balloon Securityโs graphic depiction of real-world questions.
DHS, Department of Commerce get it right: Firmware security is โoverlooked,โ โ and a genuine cybersecurity risk
A new report on ICT supply chains helps frame the ongoing threats to the essential code in embedded devices. A new report on ICT supply chains helps frame the ongoing threats to the essential code in embedded devices. A new report on ICT supply chains helps frame the ongoing threats to the essential code in […]
Adventures of Captain Obvious Issue #17.5
ADVENTURES OF CAPTAIN OBVIOUS ISSUE #17.5 The Cybersecurity Chronicles: Red Balloon Securityโs graphic depiction of real-world questions.
Shmancybear Funsomware Request
SHMANCYBEAR: A RANSOMWARE PROOF OF CONCEPT Watch this video for a short-take of our ground-breaking research, which was covered in Bloomberg, TechCrunch, ISS Source, Smart Energy International and elsewhere. This is a demonstration that should push embedded devices to the forefront of cybersecurity discussions.
A security assessment of protection relays uncovers cybersecurity weaknesses
The electrical grid depends on protection relays. Our analysis of the hardware and firmware in three models should raise concerns about the state of the industryโs overall security โ and safety. Ask any Texan who endured the power outages during a severe winter storm in February 2021 about the critical nature of the electrical grid, […]
Ransomware installation on embedded devices is possible, because weโve done it
Red Balloon Securityโs groundbreaking research has found a means of implementing ransomware on a protection relay. The process is repeatable โ and general to embedded devices. Thanks to a spate of high-profile ransomware attacks in recent years, the cyber insecurity of critical infrastructure has lodged in the public consciousness and sparked grave concerns among leaders […]