Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library.
The post Ripple20 – Ne… Continue reading Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

I don’t like dogs; I need a dog.

This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will Rogers summed it up best. He said, “If there are no dogs in Heaven, then when I die, I want to go where they went.”…
The post I don&#821… Continue reading I don’t like dogs; I need a dog.

The State of Web Application Vulnerabilities in 2018

As a web application firewall provider, part of our job at Imperva is to continually monitor for new security vulnerabilities. To do this, we use internal software that collects information from various data sources such as vulnerability databases, new… Continue reading The State of Web Application Vulnerabilities in 2018

A Multitude of Freertos Security Bugs Allow Hackers to Abuse Iot Devices

The FreeRTOS operating system widely used by IoT devices can be abused by computer hackers to take down the instances. A team of security researchers recently announced that it contains many bugs allowing hackers numerous pathways to the target IoT…R… Continue reading A Multitude of Freertos Security Bugs Allow Hackers to Abuse Iot Devices

Hackers Exploit IoT Medical Devices via Unusual Methods

The IoT medical devices have long been one of the most popular targets by computer hackers. In the past several years experts have warned both vendors and users about the vulnerabilities associated with it. Iot Medical Devices Continue to Be…Read mor… Continue reading Hackers Exploit IoT Medical Devices via Unusual Methods

If Exploited, CVE-2018-1149 Peekaboo Flaw Could Hijack CCTV Cameras

CVE-2018-1149 is a new stack buffer overflow zero-day vulnerability which endangers IoT video and security camera. Also known as Peekaboo, the zero-day is affecting security cameras and surveillance equipment that use the NUUO software. If exploited, t… Continue reading If Exploited, CVE-2018-1149 Peekaboo Flaw Could Hijack CCTV Cameras

Misconfigured MQTT Protocol Puts Thousands of Smart Homes at Risk

To no one’s surprise, there is a relatively easy way for hackers to breach thousands of smart homes. Avast researchers recently warned about the MQTT protocol (Message Queuing Telemetry Transport) which, if misconfigured, could give hackers compl… Continue reading Misconfigured MQTT Protocol Puts Thousands of Smart Homes at Risk

20 Vulnerabilities in Samsung SmartThings Hub Disrupt IoT Security

A research conducted by Cisco Talos researchers indicates that 20 vulnerabilities that affect Samsung’s SmartThings Hub may enable hackers to compromise third-party smart devices. A successful exploit of these vulnerabilities could let attackers … Continue reading 20 Vulnerabilities in Samsung SmartThings Hub Disrupt IoT Security

GetDvR Tool Exploits CVE-2018-9995 Vulnerability Against IoT Devices

A security expert from Argentina has shed light on a new hacking tool called GetDvR that exploits the CVE-2018-9995 vulnerability against IoT devices. It is able to extract account credentials of DVR devices thereby accessing the devices and their vide… Continue reading GetDvR Tool Exploits CVE-2018-9995 Vulnerability Against IoT Devices

IoT Malware Activity Already More Than Doubled 2016 Numbers

The number of new malware samples in the wild this year targeting connected internet-of-things (IoT) devices has already more than doubled last year’s total. Continue reading IoT Malware Activity Already More Than Doubled 2016 Numbers