DATE | NAME | Info | CATEG. | WEB |
19.7.25 |
The Week in Vulnerabilities: Cyble’s Weekly Cyber Threat
Report Reveals New Flaws IT and IoT Ecosystems |
Cyble’s weekly report reveals 17 critical vulnerabilities,
rising IoT attacks, and active malware campaigns targeting global IT
infrastructure. |
IoT blog |
Cyble |
18.1.25 |
IoT Botnet Linked to Large-scale DDoS Attacks Since the End
of 2024 |
Since the end of 2024, we have been continuously monitoring
large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable
IoT devices such as wireless routers and IP cameras. |
IoT blog | Trend Micro |
31.8.24 | Old devices, new dangers: The risks of unsupported IoT tech | In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors | IoT blog | Eset |
10.8.24 | 60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States | The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity - is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, like a fish can’t see the ocean. | IoT blog | BitDefender |
13.7.24 | Understanding IoT security risks and how to mitigate them | Cybersecurity podcast | As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? | IoT blog | Eset |
19.2.21 |
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT
Device (Part Two) | |
IoT blog | FireEye |
19.2.21 |
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT
Device (Part One) | |
IoT blog | FireEye |
21.11.20 |
IoT Vulnerability Assessment of the Irish IP Address Space | |
IoT blog | F5 Labs |
30.10.20 |
IoT security: Are we finally turning the corner? | |
IoT blog | Eset |
17.10.20 |
Make sure your in-home IoT is secure | |
IoT blog | Avast blog |
17.10.20 |
Two New IoT Vulnerabilities Identified with Mirai Payloads | |
IoT blog | Palo Alto Unity42 |
19.9.20 |
The Rising IoT Threat to the Agriculture Industry and the Global Food
Supply | |
IoT blog | F5 Labs |
15.8.20 |
Keeping the gate locked on your IoT devices: Vulnerabilities found on
Amazon’s Alexa | |
IoT blog | Checkpoint |
12.7.20 |
An Overview of GPS Tracking and Future Application for IoT | |
IoT blog | Palo Alto Unity42 |
5.4.20 |
Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS
Botnet | |
Attack blog IoT blog | Palo Alto Unity42 |
15.3.20 |
2020 Unit 42 IoT Threat Report | |
IoT blog | Palo Alto Unity42 |
1.2.20 |
IoT laws are coming: What to expect | |
IoT blog | Eset |
28.12.19 |
Gafgyt Targeting Huawei and Asus Routers and Killing Off Rival IoT
Botnets | |
BotNet blog IoT blog | F5 Labs |
21.12.19 |
Echobot Malware Now up to 71 Exploits, Targeting SCADA | |
IoT blog | F5 Labs |
20.10.19 |
Zingbox IoT Guardian: The Only IoT Cyber Insurance Winner Recognized in
the... | |
IoT blog | Palo Alto Networks |
12.10.19 |
How concerned are you about the privacy challenges of your IoT devices? | |
IoT blog | Eset |
24.8.19 |
The Hunt for IoT: So Easy To Compromise, Children Are Doing It | |
IoT blog | F5 Labs |
6.5.19 |
The UK plans to legislate to secure IoT, but is it really the answer? | |
IoT blog | Eset |
14.3.19 |
Cisco, Talos tout importance of IoT security at RSA keynote | |
IoT blog | Cisco Talos |
8.3.19 |
RSA – IoT security meets SMB | |
IoT blog | Eset |
20.12.18 |
How the Grinch Stole Your Christmas Lights: Leaky LED Bulbs Could be
Remotely Controlled | |
IoT blog | Symantec |
30.7.18 |
IoTroop Botnet: The Full Investigation | |
BotNet blog IoT blog | Checkpoint |
30.7.18 |
A New IoT Botnet Storm is Coming | |
BotNet blog IoT blog | Checkpoint |
| | | | |