Remove iot-vulnerability-disclosure-platform-launched
article thumbnail

IoT Vulnerability Disclosure Platform Launched

Dark Reading

VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations.

IoT 94
article thumbnail

New TCP/IP Vulnerabilities Expose IoT, OT Systems

eSecurity Planet

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things (IoT), Operational Technology (OT), and IT devices. Today, TCP/IP stacks exist as automated applications on almost every computing platform. Affected TCP/IP stacks.

IoT 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

eSecurity Planet

Cybercriminals using an IP address in China are trying to exploit a vulnerability disclosed earlier this month to deploy a variant of the Mirai malware on network routers affected by the vulnerability, according to researchers with Juniper Threat Labs. The threat is only heightened when it involves IoT devices , they wrote.

IoT 144
article thumbnail

Realtek-based routers, smart devices are being gobbled up by a voracious botnet

Malwarebytes

A few weeks ago we blogged about a vulnerability in home routers that was weaponized by the Mirai botnet just two days after disclosure. Mirai hoovers up vulnerable Internet of Things (IoT) devices and adds them to its network of zombie devices, which can then be used to launch huge Distributed Denial of Service (DDoS) attacks.

Firmware 100
article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

As technology advances, cybercriminals are finding new ways to exploit vulnerabilities and infiltrate systems. With the emergence of new attack methods such as (but not limited to) ransomware, supply chain, fileless attacks, and IoT botnets, traditional cybersecurity measures are struggling to keep up.

article thumbnail

Amazon’s “Alexa Built-in” Threat Model

Adam Shostack

Alexa Built-In is a relatively new space for Amazon: offering APIs and a platform for consumers to access via someone else’s devices. There’s a tremendous amount of guidance for IoT makers, and the lists are not well aligned. A hacker can tamper with and gain a persistent foothold. What are you going to do about it?

IoT 176
article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Related Stories Spotlight: When Ransomware Comes Calling Episode 226: The Cyber Consequences Of Our Throw Away Culture Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion. That has spurred growth in the demand for vulnerability hunters. Careers Built on Bugs. Casey Ellis is the CTO and Founder of BugCrowd.