Unmasking Ransomware: Key Challenges And Strategic Responses In Critical Infrastructure Sectors – A Mid-2024 Review


Since 2015, ransomware attacks have become a significant threat that organizations and enterprises cannot afford to ignore, especially as critical infrastructure sectors (CI) increasingly embrace digitalization. Due to IT and OT convergence, even OT environments have become targets for ransomware groups. In 2023, ransomware attacks were the most frequent incidents faced by OT environments, fol... » read more

Prevent AI Hardware Obsolescence And Optimize Efficiency With eFPGA Adaptability


Large Language Models (LLMs) and Generative AI are driving up memory requirements, presenting a significant challenge. Modern LLMs can have billions of parameters, demanding many gigabytes of memory. To address this issue, AI architects have devised clever solutions that dramatically reduce memory needs. Evolving techniques like lossless weight compression, structured sparsity, and new numer... » read more

Explore The Cost-Effective Way To Support Mandatory ADAS Systems


Cars mean more than traveling from point A to point B. They are also directly or indirectly linked to one's personal freedom – where to go, when to leave, with whom to travel – and have become a reflection of our priorities, tastes, aspirations, who we are (more often it's what we want to project ourselves to be), etc. This is why cars come in thousands of variations in color, size, and equ... » read more

Securing The Supply Chain: CMMC Essentials For Defense Contractors In OT Cybersecurity


Since September 2020, there have been several global supply chain attacks such as SolarWinds, Kaseya, NPM IconBurst, and Cyber Av3ngers Unitronics. Many of these incidents involved nation-state actors and resulted in significant disruptions and failures. In this threat landscape, the Department of Defense and critical infrastructure sectors have frequently and repeatedly come under attack, sust... » read more

New Embedded FPGA Compiler Maximizes IP Implementation Efficiency


When designing IP for system-on-chip (SoC) and application-specific integrated circuit (ASIC) implementations, IP designers strive for perfection. Optimal engineering often yields the smallest die area, thereby reducing both cost and power consumption while maximizing performance. Similarly, when incorporating embedded FPGA (eFPGA) IP into a SoC, designers prioritize these critical factors. ... » read more

Cyber Threats To The SECS/GEM Protocol In Smart Manufacturing


Semiconductors are an indispensable part of modern electronic products and are also a fundamental basis for the development of the AI industry. This industry is crucial for global economic growth and national security. As the semiconductor industry transitions to Industry 4.0, the connection between production equipment and factory networks has expanded the attack surface, providing adversaries... » read more

Big Future In A Small Space: Wireless SoCs Enable Wearable Medical And Wellness Devices To Realize Their Potential


By David Renno, David Armour, Melissa Hu, and Sezgi Koukourakis The technology of personal medical monitoring is changing incredibly fast. As little as ten years ago, the normal way that a patient would keep track of general health indicators, such as heart rate and blood pressure, or specific indicators such as blood glucose, was through an invasive medical procedure such as a blood test. S... » read more

Secure Your SoC From Side Channel Attacks With Adaptable Security


Many SoC and ASIC manufacturers rely heavily on cryptographic solutions to safeguard sensitive IP and data transmission within their devices. In a dynamic landscape where threats from attackers continue to evolve, encryption algorithms play a crucial role in fortifying defenses. Hackers today are leveraging advanced physical tactics that extend beyond traditional data interception, posing signi... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

← Older posts