Tag: iot
-
How to Use Risk-Based Metrics in an Exposure Management Program
Tags: attack, business, cloud, control, cybersecurity, data, exploit, guide, intelligence, iot, metric, mobile, monitoring, risk, service, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security engineers Arnie Cabral and Jason Schavel share how you can use risk-based metrics. You can read the entire Exposure Management Academy series here. We’re information security engineers at…
-
Unmasking the silent saboteur you didn’t know was running the show
Tags: 5G, access, ai, api, attack, authentication, backup, blockchain, breach, ciso, cloud, compliance, control, cybersecurity, data, defense, endpoint, firewall, firmware, GDPR, governance, Hardware, incident response, iot, ISO-27001, login, malicious, network, nis-2, PCI, service, siem, supply-chain, threat, zero-trustCybersecurity depends on accurate clocks : Your logs are only as valuable as your clocks are accurate. If your servers are out of sync, forget to reconstruct timelines. You’ll spend hours chasing phantom alerts. Event correlation and forensics Your SIEM is only as good as the timestamps it gets. Correlating events across endpoints, firewalls and cloud…
-
FBI Warns Smart Home Users of Badbox 2.0 Botnet Threat
The FBI says mainly Chinese-made IoT devices pose a threat from Badbox 2.0 malware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fbi-smart-home-users-badbox-20/
-
BadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warns
BadBox 2.0 malware has infected millions of IoT devices globally, creating a botnet used for cyber criminal activities, the FBI warns. The FBI published a Public Service Announcement (PSA) to warn that cybercriminals are using the BADBOX 2.0 botnet to exploit IoT devices on home networks, like streaming devices, projectors, and infotainment systems, mostly made…
-
Off-brand IoT devices are still vulnerable to BadBox botnet, FBI says
TV streaming devices, digital projectors and other IoT devices are being infected with BadBox 2.0 malware after the original campaign was stifled by German law enforcement. First seen on therecord.media Jump to article: therecord.media/iot-devices-vulnerable-to-badbox-botnet-fbi
-
New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution
The latest wave of Mirai botnet activity has resurfaced with a refined attack chain exploiting CVE-2024-3721, a critical command injection vulnerability in TBK DVR-4104 and DVR-4216 devices. This campaign leverages unpatched firmware to deploy a modified Mirai variant designed for IoT device hijacking and DDoS operations. Exploitation Vector & Payload Delivery Attackers exploit the vulnerability…
-
Critical FreeRTOS-Plus-TCP Flaw Allows Code Execution or System Crash
A critical memory corruption vulnerability, tracked as CVE-2025-5688, has been disclosed in FreeRTOS-Plus-TCP, Amazon’s open-source TCP/IP stack widely used in embedded and IoT devices. The flaw, rated 8.4 (High) on the CVSS scale, is rooted in how the stack processes Link-Local Multicast Name Resolution (LLMNR) and Multicast DNS (mDNS) queries containing excessively long DNS names,…
-
Zero-Trust-Everywhere Schutz für Daten in Zweigstellen, Multicloud- und Remote-Umgebungen
Zscaler kündigt eine neue Suite von Lösungen an, die Kunden die schnelle Einführung von Zero-Trust-Everywhere erleichtert. Diese Innovationen erweitern den Umfang von Zero-Trust, ermöglichen eine sichere Modernisierung und Skalierung von Unternehmen und bieten eine End-to-End-Segmentierung zwischen und innerhalb von Niederlassungen sowie eine verbesserte Sicherheit für Multicloud-Umgebungen. Unternehmen sind zunehmend dezentralisiert, führen schnell IoT-, OT- und…
-
Beware of Device Code Phishing
Hackers are exploiting trusted authentication flows, like Microsoft Teams and IoT logins, to trick users into handing over access tokens, bypassing MFA and slipping undetected into corporate networks. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/beware-device-code-phishing
-
New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack
A new and insidious threat has surfaced in the cybersecurity landscape as Darktrace’s Threat Research team uncovers PumaBot, a Go-based Linux botnet meticulously designed to exploit embedded Internet of Things (IoT) devices. Unlike conventional botnets that cast a wide net through indiscriminate internet scans, PumaBot employs a highly targeted strategy, fetching a curated list of…
-
Novel PumaBot slips into IoT surveillance with stealthy SSH break-ins
bypasses the usual playbook of conducting internet-wide scanning and instead brute-forces secure shell (SSH) credentials for a list of targets it receives from a command and control (C2) server.”DarkTrace researchers have identified a custom Go-based Linux botnet targeting embedded Linux Internet of Things (IoT) devices,” researchers said in a blog post. “The botnet gains initial access…
-
IT-Sicherheitskennzeichen für gesamtes IoT-Sortiment – Axis verstärkt Engagement in Cybersicherheit
First seen on security-insider.de Jump to article: www.security-insider.de/axis-open-2025-videoueberwachung-artpec-9-chip-bsi-sicherheitskennzeichen-a-5d02721fc106d6f8113979dee24113c9/
-
Attacks with new Pumabot botnet hit Linux IoT devices
First seen on scworld.com Jump to article: www.scworld.com/brief/attacks-with-new-pumabot-botnet-hit-linux-iot-devices
-
New PumaBot Hijacks IoT Devices via SSH Brute-Force for Persistent Access
Tags: access, botnet, cyber, cybersecurity, data-breach, exploit, Internet, iot, malicious, malware, software, threat, vulnerabilityA sophisticated new malware, dubbed PumaBot, has emerged as a significant threat to Internet of Things (IoT) devices worldwide. Cybersecurity researchers have identified this malicious software as a highly advanced botnet that exploits weak security configurations in IoT ecosystems, particularly targeting devices with exposed SSH (Secure Shell) ports. Emerging Threat Targets Vulnerable IoT Ecosystems By…
-
PumaBot Malware Targets Linux IoT Devices
Stealthy Malware Installs Cryptomining Software. A botnet targeting Internet of Things devices works by brute forcing credentials and downloading cryptomining software. Researchers call the botnet PumaBot, since its malware checks for the string Pumatronix, the name of a Brazilian manufacturer of surveillance and traffic camera systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/pumabot-malware-targets-linux-iot-devices-a-28526
-
New PumaBot botnet brute forces SSH credentials to breach devices
A newly discovered Go-based Linux botnet malware named PumaBot is brute-forcing SSH credentials on embedded IoT devices to deploy malicious payloads. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-pumabot-botnet-brute-forces-ssh-credentials-to-breach-devices/
-
New PumaBot targets Linux IoT surveillance devices
PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and mine crypto. Darktrace researchers discovered a new botnet called PumaBot targets Linux-based IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and mine cryptocurrency. PumaBot skips broad internet scans and instead pulls a list of targets from its…
-
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto
Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot.Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts.”Rather than scanning the internet, the malware retrieves a list of targets…
-
SHARED INTEL QA: Visibility, not volume, reframing detection for the AI-enabled SOC
For years, network security has revolved around the perimeter: firewalls, antivirus, endpoint controls. But as attackers grow more sophisticated, and as operations scatter to the cloud, mobile, and IoT, it’s increasingly what happens inside the network that counts.”¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/shared-intel-qa-visibility-not-volume-reframing-detection-for-the-ai-enabled-soc/
-
Top 12 US cities for cybersecurity job and salary growth
Tags: access, ai, apple, attack, blockchain, business, country, crowdstrike, cyber, cybersecurity, data, defense, finance, fintech, government, group, infrastructure, insurance, iot, jobs, metric, microsoft, nvidia, office, okta, privacy, software, startup, strategy, supply-chain, technology, training, warfareWhile major hubs like San Francisco naturally come to mind, and perform well based on the metrics we evaluated, there are many lesser-known cities that may be just as promising, if not more. These emerging destinations can offer easier access to job opportunities, more sustainable career paths, higher pay, and a lower cost of living.Here’s…
-
KrebsOnSecurity Hit with 6.3 Tbps DDoS Attack via Aisuru Botnet
KrebsOnSecurity hit and survided a record-breaking 6.3 Tbps DDoS attack linked to the Aisuru IoT botnet, but it shows the vulnerable state of IoT devices. First seen on hackread.com Jump to article: hackread.com/krebsonsecurity-6-3-tbps-ddos-attack-aisuru-botnet/
-
5 Monitoring-Tipps für die Cybersecurity von OT-Netzen
Die Integration von IT- und OT-Systemen revolutioniert die Arbeitsweise von Unternehmen und steigert ihre Effizienz. Doch diese Entwicklung bringt auch erhebliche Herausforderungen für die Cybersicherheit mit sich. OT-Netzwerke sind nun neuen Risiken und Gefahren ausgesetzt, während die zunehmende Verbreitung von IoT- und IIoT-Geräten die Angriffsfläche weiter vergrößert. Die steigende Zahl von Cyberangriffen, darunter Ransomware, Session-Hijacking…
-
We’re Answering Your Exposure Management Questions
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this Exposure Management Academy FAQ, we help CISOs understand exposure management, look at how advanced you might be and outline how to structure a program. You can read the entire Exposure Management…
-
Sicherheit von cyberphysischen Systemen Claroty und Ectacom schließen Vertriebspartnerschaft
Der Spezialist für die Sicherheit von cyberphysischen Systemen (CPS), Claroty, hat mit Ectacom eine Vertriebspartnerschaft für Zentral- und Osteuropa geschlossen. Der Business-Development-Distributor ergänzt die bestehenden Partner Westcon Comstor und Boll Engineering mit seiner ausgesprochenen Expertise im Bereich komplexer IoT- und OT-Security-Technologien und -dienstleistungen. ‘Clarotys Produktportfolio ist technologieführend. Nicht umsonst wird Claroty von Analysten bestens bewertet,…
-
IAM 2025: Diese 10 Trends entscheiden über Ihre Sicherheitsstrategie
Tags: access, ai, api, authentication, best-practice, cio, ciso, cloud, compliance, conference, credentials, crypto, cryptography, detection, dora, framework, governance, iam, identity, iot, kritis, login, mfa, nis-2, resilience, risk, risk-analysis, service, strategy, threat, tool, zero-trustDie Kernaussage der EIC Conference 2025: IAM ist ein ganzheitlicher Architekturansatz und kein Toolset. Identity & Access Management (IAM) ist nicht länger eine Frage der Tool-Auswahl, sondern der Architektur. Diese Kernaussage prägte die European Identity and Cloud Conference 2025, die vom 6. bis 9. Mai in Berlin stattfand. Mit über 1.500 Teilnehmern, 300 Rednern und…
-
UK Considers New Enterprise IoT Security Law
The UK government wants to hear feedback on a possible new standard or legislation to improve enterprise IoT security First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/government-enterprise-iot-security/
-
Criminal Proxy Network Infects Thousands of IoT Devices
The criminal proxy network infected thousands of IoT and end-of-life devices, creating dangerous botnet First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/proxy-network-infects-iot-devices/
-
âš¡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
What do a source code editor, a smart billboard, and a web server have in common? They’ve all become launchpads for attacks”, because cybercriminals are rethinking what counts as “infrastructure.” Instead of chasing high-value targets directly, threat actors are now quietly taking over the overlooked: outdated software, unpatched IoT devices, and open-source packages. It’s not…

