Internet of Things

Chaining three critical vulnerabilities allows takeover of D-Link routersChaining three critical vulnerabilities allows takeover of D-Link routers

Chaining three critical vulnerabilities allows takeover of D-Link routers

Researchers from the Silesian University of Technology in Poland discovered several flaws that could be exploited to take over some…

7 years ago
Millions of Xiongmai video surveillance devices can be easily hacked via cloud featureMillions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber…

7 years ago
Expert presented a new attack technique to compromise MikroTik RoutersExpert presented a new attack technique to compromise MikroTik Routers

Expert presented a new attack technique to compromise MikroTik Routers

Experts from Tenable Research have devised a new attack technique to fully compromise MikroTik Routers. MikroTik routers continue to be…

7 years ago
Sony Bravia Smart TVs affected by a critical vulnerabilitySony Bravia Smart TVs affected by a critical vulnerability

Sony Bravia Smart TVs affected by a critical vulnerability

Experts at FortiGuard Labs team discovered three vulnerabilities in eight Sony Bravia smart TVs, one of them rated as critical.…

7 years ago
GhostDNS malware already infected over 100K+ devices and targets 70+ different types of home routersGhostDNS malware already infected over 100K+ devices and targets 70+ different types of home routers

GhostDNS malware already infected over 100K+ devices and targets 70+ different types of home routers

Security experts from Qihoo 360 NetLab spotted GhostDNS, a malware that already infected over 100K+ devices and targets 70+ different types…

7 years ago
Torii botnet, probably the most sophisticated IoT botnet of everTorii botnet, probably the most sophisticated IoT botnet of ever

Torii botnet, probably the most sophisticated IoT botnet of ever

Avast spotted a new IoT botnet, tracked as Torii, that appears much more sophisticated and stealth of the numerous Mirai variants previously…

7 years ago
Sustes Malware: CPU for MoneroSustes Malware: CPU for Monero

Sustes Malware: CPU for Monero

Sustes Malware doesn't infect victims by itself, but it is spread via brute-force activities with special focus on IoT and…

7 years ago
Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”

Dissecting the first Gafgyt bot implementing the “VanillaUPX technique”

Experts at the CSE Cybsec Z-Lab have found a Gafgyt variant implementing the VanillaUPX technique recently presented in a cybersecurity…

7 years ago
Evolution of threat landscape for IoT devices – H1 2018Evolution of threat landscape for IoT devices – H1 2018

Evolution of threat landscape for IoT devices – H1 2018

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting…

7 years ago
One year later BlueBorne disclosure, over 2 Billion devices are still vulnerableOne year later BlueBorne disclosure, over 2 Billion devices are still vulnerable

One year later BlueBorne disclosure, over 2 Billion devices are still vulnerable

One year after the discovery of the BlueBorne Bluetooth vulnerabilities more than 2 billion devices are still vulnerable to attacks.…

7 years ago