Security Experts:

long dotted


The Hoaxcalls IoT botnet has expanded the list of targeted devices and has added new DDoS capabilities to its arsenal. [Read More]
Starbleed is a newly disclosed vulnerability in FPGA chips that can expose many mission- and safety-critical devices to attacks. [Read More]
Even seemingly insignificant IoT devices such as LED light control consoles can be abused to launch malicious attacks, warns Microsoft. [Read More]
Multiple botnets are targeting a zero-day vulnerability in fiber routers in an attempt to ensnare them and leverage their power for malicious purposes. [Read More]
Linksys has prompted users to reset passwords after learning that hackers were leveraging stolen credentials to change router settings and direct customers to malware. [Read More]
The Hoaxcalls botnet is actively targeting a recently patched SQL injection vulnerability in a Grandstream IP PBX appliance. [Read More]
A recently identified IoT botnet has modules developed in a manner that makes it significantly more “potent and robust” than other IoT botnets. [Read More]
Healthcare cybersecurity company CyberMDX has raised $20 million, which brings the total raised to date to $30 million. [Read More]
Vulnerabilities in Lexus and Toyota cars could be exploited by hackers to launch remote attacks against affected vehicles, Tencent Keen Security Lab’s researchers discovered. [Read More]
Malicious actors have been exploiting vulnerabilities in some DrayTek enterprise routers in attacks that started before patches were released. [Read More]


rss icon

Laurence Pitt's picture
Speech recognition systems make mistakes that could give cybercriminals access to a user’s home network. By activating a squatted skill, an unexpecting user could allow a malicious actor to extract information about their account, home network and even passwords before running the requested command.
Marc Solomon's picture
The ability to aggregate, score and prioritize data and alerts within the context of your environment can allow you to take the right actions faster to mitigate IoT risk.
Dean Weber's picture
IoT security is a tough challenge — involving everything from hard to implement standards; hard to reach industrial components; and choices on how to integrate security around both older “brownfield” and newer IoT systems and equipment.
Laurence Pitt's picture
Organizations are now running IoT application workloads in diverse locations that create complex ecosystems for IT and security personnel to oversee.
John Maddison's picture
Organizations can no longer afford to treat IoT devices as an isolated or independent component of their business, and must implement an effective IoT security strategy.
Laurence Pitt's picture
Advanced smart infrastructure, cloud networks and the Internet of Things (IoT) add more points of entry and ultimately more risk for both network operators and end users.
John Maddison's picture
Since access control technologies are usually the first network element that a new device touches, they need to be able to automatically recognize IoT devices.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Torsten George's picture
Unfortunately, the Cyber Shield Act as it stands falls short, since it is a voluntary program that does not incentivize vendors to implement the NIST security standards.