Security News
Best industrial IoT security solutions FirstPoint Best for cellular IoT connectivity. FortiNAC is the network access control solution by Fortinet, which provides security for networks with IoT. Its security capabilities protect networks against IoT threats, enable control of third-party devices and come with automatic features that respond to different security-related stimuli.
Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production and manufacturing,...
A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities in the internet of things devices and other software. The botnet "Contains several modules, including self-replication, attacks for different protocols, and self-propagation," Fortinet FortiGuard Labs researcher Cara Lin said.
In this context, device buyers should consider where their devices come from and regional regulations. Let's look at why the origin of connected devices today matters more than ever.
Over a dozen security flaws have been discovered in baseboard management controller firmware from Lanner that could expose operational technology and internet of things networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip, that's found in server motherboards and is used for remote monitoring and management of a host system, including performing low-level system operations such as firmware flashing and power control.
Over a dozen security flaws have been discovered in baseboard management controller firmware from Lanner that could expose operational technology and internet of things networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip, that's found in server motherboards and is used for remote monitoring and management of a host system, including performing low-level system operations such as firmware flashing and power control.
Although there are plenty of use cases for industrial IoT solutions, there are security risks associated with the technology. Device hijacking is one of the common security challenges of IIoT. It can occur when the IoT sensor or endpoint is hijacked.
In our own analysis of millions of IoT devices deployed in corporate environments, we have found that both high-risk and critical vulnerabilities are widespread. Half of all IoT devices have vulnerabilities with a CVSS score of at least 8, and 20% have critical vulnerabilities with a CVSS score of 9-10. If a company doesn't even know which devices are on its network, how can it possibly defend them from attack or protect its IT network from lateral movement after a successful IoT breach?
IoT has been part of our reality for quite some time, but what about the security of these devices? Is it becoming a priority? We've seen the concern and prioritization of IoT security growing, this is due both to the growing popularity of these devices and the push we are seeing from the public sector to strengthen America's cybersecurity.
Common IoT devices include security cameras, industrial lighting systems, and manufacturing controllers managed by a web-based solution. Some commonly overlooked IoT devices include multi-function printers, security scanners, and inventory scanners.