IoT Security

DigiEver IoT Devices Exploited To Deliver Mirai-based MalwareDigiEver IoT Devices Exploited To Deliver Mirai-based Malware

DigiEver IoT Devices Exploited To Deliver Mirai-based Malware

A new Mirai-based botnet, "Hail Cock Botnet," has been exploiting vulnerable IoT devices, including DigiEver DVRs and TP-Link devices with…

3 months ago
Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi LoginsReyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Researchers discovered multiple vulnerabilities in Ruijie Networks' cloud-connected devices. By exploiting these vulnerabilities, attackers can remotely compromise access points, gain…

4 months ago
Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting VulnerabilitiesWater Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in a residential proxy marketplace by leveraging…

4 months ago
Millions Of IoT Devices Vulnerable To Attacks Leads To Full TakeoverMillions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million IoT-enabled devices. Notably, ThroughTek Kalay's influence…

11 months ago
A guide To IoT Security – Protect Your Connected DevicesA guide To IoT Security – Protect Your Connected Devices

A guide To IoT Security – Protect Your Connected Devices

Living in the digital era, accompanied by technological devices that have become a part of our everyday routine, the IoT…

12 months ago
Live Forensic Techniques To Detect Ransomware Infection On Linux MachinesLive Forensic Techniques To Detect Ransomware Infection On Linux Machines

Live Forensic Techniques To Detect Ransomware Infection On Linux Machines

Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, evading traditional…

1 year ago