Security News

Why most IoT cybersecurity strategies give zero hope for zero trust
2023-01-23 05:00

IoT remains the biggest hurdle in achieving an effective zero-trust security posture across an organization. In this Help Net Security video, Denny LeCompte, CEO at Portnox, discusses how IoT has been difficult to profile accurately and why zero trust strategies fail when applied to IoT. More about.

Study: Consumer security savvy is way behind IoT threat landscape
2022-12-20 18:22

With the rapid expansion of Internet-connected devices, both consumer and industrial, the cyber-threat landscape is growing faster than individuals' ability to keep up. Comcast's biennial take on consumer cyber health, the 2022 Xfinity Cyber Health Report, found that there are an average of 15 connected devices per household, up 25% from 2020 - with "Power users" having as many as 34.

Top industrial IoT security solutions
2022-12-13 17:17

Best industrial IoT security solutions FirstPoint Best for cellular IoT connectivity. FortiNAC is the network access control solution by Fortinet, which provides security for networks with IoT. Its security capabilities protect networks against IoT threats, enable control of third-party devices and come with automatic features that respond to different security-related stimuli.

How IoT is changing the threat landscape for businesses
2022-12-08 05:00

Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production and manufacturing,...

New Go-based Botnet Exploiting Exploiting Dozens of IoT Vulnerabilities to Expand its Network
2022-12-07 04:03

A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities in the internet of things devices and other software. The botnet "Contains several modules, including self-replication, attacks for different protocols, and self-propagation," Fortinet FortiGuard Labs researcher Cara Lin said.

IoT device origin matters more than ever
2022-11-30 06:00

In this context, device buyers should consider where their devices come from and regional regulations. Let's look at why the origin of connected devices today matters more than ever.

Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks
2022-11-28 10:07

Over a dozen security flaws have been discovered in baseboard management controller firmware from Lanner that could expose operational technology and internet of things networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip, that's found in server motherboards and is used for remote monitoring and management of a host system, including performing low-level system operations such as firmware flashing and power control.

Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks
2022-11-28 10:07

Over a dozen security flaws have been discovered in baseboard management controller firmware from Lanner that could expose operational technology and internet of things networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip, that's found in server motherboards and is used for remote monitoring and management of a host system, including performing low-level system operations such as firmware flashing and power control.

Top 6 security risks associated with industrial IoT
2022-11-23 10:15

Although there are plenty of use cases for industrial IoT solutions, there are security risks associated with the technology. Device hijacking is one of the common security challenges of IIoT. It can occur when the IoT sensor or endpoint is hijacked.

6 ways to reduce your IoT attack surface
2022-11-07 09:46

In our own analysis of millions of IoT devices deployed in corporate environments, we have found that both high-risk and critical vulnerabilities are widespread. Half of all IoT devices have vulnerabilities with a CVSS score of at least 8, and 20% have critical vulnerabilities with a CVSS score of 9-10. If a company doesn't even know which devices are on its network, how can it possibly defend them from attack or protect its IT network from lateral movement after a successful IoT breach?