Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

3/23/2015
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IOActive Launches New Hardware Lab

Company adds new Global 50 clients to roster, expands into Middle East

Seattle, USA — March 23, 2015IOActive, Inc., the leading global provider of hardware, software, and wetware security services, announced strong business results for the fiscal year ending December 31, 2014. Growth was driven by innovative and groundbreaking research, as well as international expansion and success in vertical markets.

“IOActive had an incredible 2014 that celebrated several firsts,” said Jennifer Steffens, chief executive officer for IOActive. “Innovative research from our team helped secure success for us in vertical, emerging markets and also drove expansion within our Industrial and Vehicle practice areas globally.”

“Our steady growth is indicative of the fact that every company–be it a start-up or a 40-year-old Fortune 500 company–is a target for attackers and cyber criminals,” said Matt Rahman, executive vice president of global sales and marketing for IOActive. “Third-party security assessment is no longer a ‘nice to have’ for companies, but an accepted organizational best practice.”

Key highlights for 2014 include:

         Industry-leading Research by IOActive Staff

o   Mobile banking apps research highlighted vulnerabilities in mobile banking applications from some of the most influential banks around the world.  

o   SATCOM security research revealed issues in the satellite communication (SATCOM) terminals used by the aerospace, maritime, military and government, emergency service, industrial (oil rigs, gas, electricity), and media sectors.

o   Traffic control systems research highlighted issues in traffic control systems around the world, laying the foundation for bigger security issues facing Smart Cities.

o   Vehicle security research examined the world of the connected car and what it means to the automotive industry.

        Market Growth and Expansion

In addition to expanding into the Middle East, IOActive continued to add new customers throughout the US, Europe, Asia, and Africa.

        Expanding Service Practice Areas

IOActive expanded its Vehicle Security Service practice. The company now offers full vehicle assessments and private research, as well as a Vehicle Security Development Lifecycle program. IOActive also appointed Twitter’s Charlie Miller to its Advisory Board.         

IOActive’s Industrial Service practice has been updated to address the Industrial Internet of Things (IoT) and shifts in Operational Technology (OT) customers, as well as new advances in the transportation and healthcare industries.

        Industry Recognition

IOActive was included on the list of Cool Vendors for Managing OT in a Digital Business, 2014 [1] report by Gartner, Inc.

New Hardware Lab

In addition to today’s results announcement, IOActive is launching a newly expanded hardware lab to provide services from chip to code. The lab underwent a significant transformation in 2014 when it relocated to a 5,000 square-foot space equipped with Scanning Electron Microscopes (SEMs), Focussed Ion Beams (FIBs), confocal optical imaging equipment, and a variety of analytical tools. As adversaries exploit hardware, IOActive will stay ahead through continued research.

The lab offers:

?         Embedded device security analysis

?         Physical attack resistance

?         Low-level device firmware and driver assessment

?         Chip and semiconductor analysis

?         Several other services not made public

For a video overview of the lab, presented by Jason Larsen, principal security consultant for IOActive, please visit: http://www.ioactive.com/labs/resources-white-papers.html

About IOActive

IOActive is a comprehensive, high-end information security services firm with a long and established track record in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment to chip reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, US, with global operations through the Americas, EMEA, and Asia Pac regions. Visit www.ioactive.com for more information. Read the IOActive Labs Research Blog: http://blog.ioactive.com. Follow IOActive on Twitter: http://twitter.com/ioactive.

Disclaimer
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

[1] Gartner “Cool Vendors for Managing OT in a Digital Business, 2014” by Kristian Steenstrup, Earl Perkins, Alfonso Velosa, April 22, 2014

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...