securityaffairs.com
M2M protocols can be abused to attack IoT and IIoT systems
Security experts discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of Things (IIoT) systems.
Pierluigi Paganini