Hardware Security Guide to Industry Standards and Regulations


In an era marked by relentless technological advancements, the significance of cybersecurity standards, regulations and guidelines has emerged as a critical dimension for companies engaged in the manufacturing of electronic devices. In this dynamic landscape, semiconductor manufacturers are compelled to navigate a complex web of standards and compliance requirements to ensure hardware security... » read more

Securing Semiconductor Manufacturing: Tackling Cybersecurity Challenges in SECS/GEM Protocols


As the global demand for electronics continues to surge, the semiconductor market has reached unprecedented revenue levels. The industry’s value chain comprises four critical stages, each presenting unique cybersecurity challenges: -Integrated Circuit Design Engineers design the layout and functionality of integrated circuits using Electronic Design Automation (EDA) tools. -Photomask P... » read more

Security Focus Widens To HW, SW, Ecosystems


Hardware security strategies are pushing much further left in the chip design flow as the number of vulnerabilities in complex designs and connected devices continues to grow, taking into account potential vulnerabilities in both hardware and software, as well as the integrity of an extended global supply chain. These approaches leverage the speed of fixing problems in software, and the effe... » read more

Cyber Threats To The SECS/GEM Protocol In Smart Manufacturing


Semiconductors are an indispensable part of modern electronic products and are also a fundamental basis for the development of the AI industry. This industry is crucial for global economic growth and national security. As the semiconductor industry transitions to Industry 4.0, the connection between production equipment and factory networks has expanded the attack surface, providing adversaries... » read more

Strategies For Defense Against Fuxnet ICS Malware


According to recent cybersecurity media reports, a new destructive ICS malware named Fuxnet has been discovered. This incident is allegedly linked to the Blackjack hacker group, which is associated with Ukrainian security agencies. It involved a major attack on Moscollector, a Moscow-based company responsible for managing critical infrastructure such as water supply, sewage treatment, and com... » read more

Can Your Doorbell Be Spoofed?


Voice anti-spoofing is a set of techniques designed to prevent scam attempts that involve mimicked voices and improve the overall UI/UX experience of VUI systems by preventing accidental triggers. These techniques are particularly important to prevent issues related to: Speech Synthesis (SS): This type of attack employs a computer-simulated voice Voice Conversion (VC): In this attack,... » read more

2024 Open Source Security And Risk Analysis Report


This report offers recommendations to help creators and consumers of open source software manage it responsibly, especially in the context of securing the software supply chain. Whether a consumer or provider of software, you are part of the software supply chain, and need to safeguard the applications you use from upstream as well as downstream risk. In the following pages, we e... » read more

The Crisis of Convergence: OT/ICS Cybersecurity 2023


In 2023, many forces came into play that led to unprecedented cybersecurity challenges in the OT/ICS domain. Not only did the issues of IT-OT convergence and Ransomware-as-a-Service persist, but geopolitical tensions precipitated increased state-sponsored and civilian hacker activities as well. In this report, TXOne Networks worked with Frost & Sullivan to survey 405 key IT and OT security ... » read more

Enhancing HMI Security: How To Protect ICS Environments From Cyber Threats


HMIs (Human Machine Interfaces) can be broadly defined as just about anything that allows humans to interface with their machines, and so are found throughout the technical world. In OT environments, operators use various HMIs to interact with industrial control systems in order to direct and monitor the operational systems. And wherever humans and machines intersect, security problems can ensu... » read more

Securing The Food Supply: Industrial Cybersecurity In The Food And Beverage Sector


This publication unpacks the various aspects of the food and beverage industry in relation to cybersecurity. The angles we explore are: Cyber Threats: The food, beverage, and agriculture sectors have become targets for cyber threats at an increasing rate, with 2021 standing out as the most severe. Alarmingly, this uptick did not have a corresponding decrease in the following years, remain... » read more

← Older posts