Blog Posts
Exfiltration with IPv6 tunnels on Windows
Discover the risks associated with exfiltration using IPv6 tunnels on Windows systems and learn mitigation strategies to enhance network security in this SEI Blog.
• By Dan J. Klinedinst, Will Dormann
In CERT/CC Vulnerabilities
8 At-Risk Emerging Technologies
Identifying 8 emerging technologies at risk for security vulnerabilities, this SEI Blog post covers autonomous systems, AI, 5G networks and more.
• By Dan J. Klinedinst
In CERT/CC Vulnerabilities
Secure Software Updates
This SEI Blog post explores the importance of secure software updates and provides strategies to ensure the integrity and security of software patches.
• By Dan J. Klinedinst, CERT Insider Threat Center
In CERT/CC Vulnerabilities
On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle
We worked with DHS US-CERT and the Department of Transportations' Volpe Center to study aftermarket on-board diagnostic (OBD-II) devices....
• By Dan J. Klinedinst
In CERT/CC Vulnerabilities
Vehicle Cybersecurity: The Jeep Hack and Beyond
Automobiles are often referred to as "computers on wheels" with newer models containing more than 100 million lines of code. This blog post highlights the first phase of our research …