To Protect Industrial Ecosystems (ICS/OT)
We assist organizations to measure and manage cybersecurity risk, identify and remediate cybersecurity weaknesses, make the right cybersecurity technology investment decisions, and build resilience to prepare for and respond to cybersecurity incidents.
Assessment and Testing
Measure and manage risk, identify critical assets, and increase compliance with our risk assessment, penetration testing, and gap assessment services.
Policy Guidance and Architecture
Improve processes with NIST and IEC standards based cybersecurity policies; and establish a secure architecture.
Enable and empower your employees to protect your infrastructure with a carefully curated cybersecurity awareness program.
Our Track Record
We help you transform your security posture.
To protect from evolving cyber threats.
Delivering Solutions with Lasting Value
We serve a wide range of industries. Our industry knowledge and experience will enable you to effectively deal with cyber threats.
Oil & Gas
Our approach is simple. We help you adopt holistic, pragmatic and sustainable security with fact- and intelligence-based strategic decisions.
Holistic, Pragmatic, Sustainable Security
Security must be holistic, pragmatic and sustainable to protect from evolving threats.
Information And Intelligence-led Decisions
Intelligence-led and information based approach empowers strategic decision making.
Personalized And Cost Effective Solutions
Solving problems unique to your business with personalized and cost-effective solutions.
The vulnerability family titled “SweynTooth” is a collection of 12 vulnerabilities with the potential for more to be identified and released. These vulnerabilities are reported to affect at least seven different BLE SoC manufacturers utilizing various affected software development kits (SDK). According to the information released by the researchers, the BLE SoC manufacturers include Texas Instruments, NXP Semiconductors, Cypress, Dialog Semiconductors, Microchip, STMicroelectronics, and Telink Semiconductor. The vulnerabilities expose flaws in specific BLE SoC implementations that allow an attacker in radio range to trigger deadlocks, crashes, buffer overflows, or the complete bypass of security.
It is reported that smart-home devices, wearables, environmental tracking or sensing devices, and several medical and logistics products could be affected. The affected medical devices may include pacemakers, blood glucose monitors, and others using affected BLE SDKs.
Vulnerabilities in complex
Chance of being affected
The BLE SoC manufacturers reported using affected software development kits (SDK) have issued the following user notifications or provided the following patches for device manufacturers. Additional notifications and patches are pending and will be updated as they become available.
Get A Free Consultation
Learn more about our services and solutions to protect your business.