IoT

Law enforcement takes down proxy botnets used by criminals

Law enforcement takes down proxy botnets used by criminals 2025-05-12 at 21:11 By Zeljka Zorz US and Dutch law enforcement, with the help of Lumen researchers, have disrupted 5socks and Anyproxy, two proxy-for-rent services that were used by criminals for ad fraud and DDoS and brute-force attacks (among other things). The domain seizure notice The […]

React to this headline:

Loading spinner

Law enforcement takes down proxy botnets used by criminals Read More »

New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA

New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA 2025-05-07 at 17:58 By Ryan Naraine By baking minimum expectations into procurement conversations, the plan is to steer software vendors to “secure-by-design and default” basics. The post New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA Read More »

Samsung MagicINFO Vulnerability Exploited Days After PoC Publication

Samsung MagicINFO Vulnerability Exploited Days After PoC Publication 2025-05-06 at 14:33 By Ionut Arghire Threat actors started exploiting a vulnerability in Samsung MagicINFO only days after a PoC exploit was published. The post Samsung MagicINFO Vulnerability Exploited Days After PoC Publication appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Samsung MagicINFO Vulnerability Exploited Days After PoC Publication Read More »

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities 2025-04-30 at 16:31 By Zeljka Zorz Vulnerabilities in Apple’s AirPlay Protocol, AirPlay Software Development Kits (SDKs), and the CarPlay Communication Plug-in could allow attackers to compromise AirPlay-enabled devices developed and sold by Apple and by other companies. “Because AirPlay is a fundamental piece of software for Apple

React to this headline:

Loading spinner

Airplay-enabled devices open to attack via “AirBorne” vulnerabilities Read More »

Eyes, ears, and now arms: IoT is alive

Eyes, ears, and now arms: IoT is alive 2025-04-29 at 09:36 By Help Net Security I’ve never quite seen anything like this in my two decades of working in the Internet of Things (IoT) space. In just a few years, devices at home and work started including cameras to see and microphones to hear. Now,

React to this headline:

Loading spinner

Eyes, ears, and now arms: IoT is alive Read More »

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware 2025-03-28 at 14:50 By Kevin Townsend Analysis found that 99% of healthcare organizations are vulnerable to publicly available exploits. The post Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware Read More »

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices 2025-03-05 at 10:31 By Eduard Kovacs The Eleven11bot botnet has been described as one of the largest known DDoS botnets observed in recent years.  The post New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices Read More »

The risks of autonomous AI in machine-to-machine interactions

The risks of autonomous AI in machine-to-machine interactions 2025-02-18 at 08:03 By Mirko Zorz In this Help Net Security, Oded Hareven, CEO of Akeyless Security, discusses how enterprises should adapt their cybersecurity strategies to address the growing need for machine-to-machine (M2M) security. According to Hareven, machine identities must be secured and governed similarly to human

React to this headline:

Loading spinner

The risks of autonomous AI in machine-to-machine interactions Read More »

Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare

Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare 2025-02-04 at 13:48 By Ionut Arghire The Contec CMS8000 patient monitors do not contain a malicious backdoor but are plagued by an insecure and vulnerable design. The post Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare appeared first on

React to this headline:

Loading spinner

Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare Read More »

Addressing the intersection of cyber and physical security threats

Addressing the intersection of cyber and physical security threats 2025-01-21 at 07:05 By Mirko Zorz In this Help Net Security, Nicholas Jackson, Director of Cyber Operations at Bitdefender, discusses how technologies like AI, quantum computing, and IoT are reshaping cybersecurity. He shares his perspective on the new threats these advancements bring and offers practical advice

React to this headline:

Loading spinner

Addressing the intersection of cyber and physical security threats Read More »

The U.S. Cyber Trust Mark set to launch

The U.S. Cyber Trust Mark set to launch 2025-01-08 at 16:03 By Zeljka Zorz The White House has announced the launch of the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program for consumer-grade internet-connected devices. “The White House launched this bipartisan effort to educate American consumers and give them an easy way to assess

React to this headline:

Loading spinner

The U.S. Cyber Trust Mark set to launch Read More »

2025 is going to be a bumpy year for IoT

2025 is going to be a bumpy year for IoT 2024-12-24 at 08:18 By Help Net Security In the Internet of Things (IoT) sector, 2025 is shaping up to be a politically charged year. Major global jurisdictions are set to implement device security regulations, coinciding with potential tariffs, shifting production dynamics, and rising geopolitical tensions.

React to this headline:

Loading spinner

2025 is going to be a bumpy year for IoT Read More »

Why cybersecurity is critical to energy modernization

Why cybersecurity is critical to energy modernization 2024-12-20 at 07:53 By Mirko Zorz In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresses the need for international collaboration,

React to this headline:

Loading spinner

Why cybersecurity is critical to energy modernization Read More »

Researchers reveal OT-specific malware in use and in development

Researchers reveal OT-specific malware in use and in development 2024-12-17 at 16:43 By Zeljka Zorz Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient threats based on samples uploaded

React to this headline:

Loading spinner

Researchers reveal OT-specific malware in use and in development Read More »

How to choose secure, verifiable technologies?

How to choose secure, verifiable technologies? 2024-12-06 at 12:16 By Zeljka Zorz The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services

React to this headline:

Loading spinner

How to choose secure, verifiable technologies? Read More »

Best practices for staying cyber secure during the holidays

Best practices for staying cyber secure during the holidays 2024-12-03 at 07:07 By Help Net Security In this Help Net Security video, Sean Tufts, managing partner for critical infrastructure and operational technology at Optiv, discusses best practices for keeping businesses secure amidst a barrage of threats during the holiday season. Pause large changes in your

React to this headline:

Loading spinner

Best practices for staying cyber secure during the holidays Read More »

Maximizing security visibility on a budget

Maximizing security visibility on a budget 2024-11-05 at 07:03 By Mirko Zorz In this Help Net Security interview, Barry Mainz, CEO at Forescout, discusses the obstacles organizations encounter in attaining security visibility, particularly within cloud and hybrid environments. He explains why asset intelligence—going beyond basic visibility to understand device behavior and risk—is essential. Mainz also

React to this headline:

Loading spinner

Maximizing security visibility on a budget Read More »

IoT needs more respect for its consumers, creations, and itself

IoT needs more respect for its consumers, creations, and itself 2024-10-31 at 07:58 By Help Net Security Yet again, connected devices are in the news for all the wrong reasons. In October, security researchers found that robot vacuums from Chinese company, Ecovacs, can be compromised via a backdoor. In one case, hackers gained control over

React to this headline:

Loading spinner

IoT needs more respect for its consumers, creations, and itself Read More »

The role of compromised cyber-physical devices in modern cyberattacks

The role of compromised cyber-physical devices in modern cyberattacks 2024-10-17 at 11:46 By Zeljka Zorz Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attackers’ infrastructure leads to a better understanding of the

React to this headline:

Loading spinner

The role of compromised cyber-physical devices in modern cyberattacks Read More »

EU adopts Cyber Resilience Act to secure connected products

EU adopts Cyber Resilience Act to secure connected products 2024-10-11 at 14:17 By Zeljka Zorz The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products that are

React to this headline:

Loading spinner

EU adopts Cyber Resilience Act to secure connected products Read More »

Scroll to Top