article thumbnail

Solar Panels at Risk of Cyber Attacks, warn Experts

CyberSecurity Insiders

This conclusion was reached after a comprehensive assessment of inverters from eight different manufacturers, revealing that none of them met even the basic security standards. It is crucial for manufacturers to actively play a role in offering products that comply with established photovoltaic cybersecurity standards.

article thumbnail

Security Affairs newsletter Round 377

Security Affairs

Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports Slack resets passwords for about 0.5% Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports Slack resets passwords for about 0.5%

Spyware 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Overview of IoT threats in 2023

SecureList

As if that were not enough, many IoT devices have unalterable main passwords set by manufacturers. Dark web services: DDoS attacks, botnets, and zero-day IoT vulnerabilities Of all IoT-related services offered on the dark web, DDoS attacks are worth examining first. Unfortunately, users tend to leave these passwords unchanged.

IoT 101
article thumbnail

The Growing Presence (and Security Risks) of IoT

Thales Cloud Protection & Licensing

In the absence of IoT security regulations, many smart product manufacturers simply release new devices that lack built-in security measures and have not undergone proper security review and testing. Take manufacturing, for instance. Cyber attacks against the company aren’t the only relevant threat, however.

IoT 122
article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

How effective are attackers with regard to RF in eavesdropping, DoS & DDoS, MitM, spoofing and malware propagation? DoS & DDoS: Attackers can flood RF channels, causing disruption. Criminals may use hijacked drones for illegal surveillance, smuggling, or even as weapons. Are there any interesting case studies?

article thumbnail

The Death botnet grows targeting AVTech devices with a 2-years old exploit

Security Affairs

AVTech is one of the world’s leading CCTV manufacturers, it is the largest public-listed company in the Taiwan surveillance industry. “The Death botnet purpose was orginally just to ddos but I have a greater plan on it soon. I dont really use it for attacks only to get customers aware of the power it has.”

article thumbnail

APT trends report Q1 2022

SecureList

Subsequently, DDoS attacks hit several government websites. Another victim in which the same chain was exhibited is a computer game manufacturer in Cambodia, where the attack could have been used for a different purpose, possibly to infiltrate the company’s supply chain.

Malware 137