IoT Vulnerability Disclosure Platform Launched
Dark Reading
OCTOBER 19, 2020
VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations.
Dark Reading
OCTOBER 19, 2020
VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations.
eSecurity Planet
JANUARY 6, 2021
Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things (IoT), Operational Technology (OT), and IT devices. Today, TCP/IP stacks exist as automated applications on almost every computing platform. Affected TCP/IP stacks.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
eSecurity Planet
AUGUST 10, 2021
Cybercriminals using an IP address in China are trying to exploit a vulnerability disclosed earlier this month to deploy a variant of the Mirai malware on network routers affected by the vulnerability, according to researchers with Juniper Threat Labs. The threat is only heightened when it involves IoT devices , they wrote.
Malwarebytes
AUGUST 24, 2021
A few weeks ago we blogged about a vulnerability in home routers that was weaponized by the Mirai botnet just two days after disclosure. Mirai hoovers up vulnerable Internet of Things (IoT) devices and adds them to its network of zombie devices, which can then be used to launch huge Distributed Denial of Service (DDoS) attacks.
Jane Frankland
MAY 8, 2024
As technology advances, cybercriminals are finding new ways to exploit vulnerabilities and infiltrate systems. With the emergence of new attack methods such as (but not limited to) ransomware, supply chain, fileless attacks, and IoT botnets, traditional cybersecurity measures are struggling to keep up.
Adam Shostack
MARCH 5, 2020
Alexa Built-In is a relatively new space for Amazon: offering APIs and a platform for consumers to access via someone else’s devices. There’s a tremendous amount of guidance for IoT makers, and the lists are not well aligned. A hacker can tamper with and gain a persistent foothold. What are you going to do about it?
The Security Ledger
NOVEMBER 3, 2021
Related Stories Spotlight: When Ransomware Comes Calling Episode 226: The Cyber Consequences Of Our Throw Away Culture Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion. That has spurred growth in the demand for vulnerability hunters. Careers Built on Bugs. Casey Ellis is the CTO and Founder of BugCrowd.
Let's personalize your content