Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices

Forescout’s 2024 analysis of the riskiest devices highlights vulnerabilities and threat actor interactions across IT, IoT, OT, and IoMT.
The post Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices appeared first on Securit… Continue reading Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices

Why does AWS strongly recommend a non-self-signed, code-signing certificate?

I am developing a hardware device that utilizes AWS IoT OTA via FreeRTOS. On this AWS web page, it says

We recommend that you purchase a code-signing certificate from a
company with a good reputation for security. Do not use a self-signe… Continue reading Why does AWS strongly recommend a non-self-signed, code-signing certificate?

Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.
The post Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hack… Continue reading Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked

Hackaday Links: May 19, 2024

Hackaday Links Column Banner

If there was one question we heard most often this week, it was “Did you see it?” With “it” referring to the stunning display of aurora borealis — and australis, …read more Continue reading Hackaday Links: May 19, 2024

IoT Cameras Exposed by Chainable Exploits, Millions Affected

By Deeba Ahmed
A recent discovery of 4 security flaws in ThroughTek’s Kalay platform leaves millions of IoT devices exposed. This article explores the security risks to your connected home and the broader threat to IoT devices. Act now – secure your sm… Continue reading IoT Cameras Exposed by Chainable Exploits, Millions Affected

Cinterion Modem Vulnerabilities Leave IoT and Industrial Networks Exposed

By Waqas
Millions of IoT and industrial devices at risk! Critical vulnerabilities in Cinterion cellular modems allow remote attackers to take control.
This is a post from HackRead.com Read the original post: Cinterion Modem Vulnerabilities Leave IoT an… Continue reading Cinterion Modem Vulnerabilities Leave IoT and Industrial Networks Exposed

How Can Businesses Defend Themselves Against Common Cyberthreats?

TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zero-days, ransomware and deepfakes. Continue reading How Can Businesses Defend Themselves Against Common Cyberthreats?

Regulators are coming for IoT device security

Cybersecurity is a relatively new challenge for many IoT device makers who have traditionally produced non-connected devices. These devices were less vulnerable to exploitation and, as a result, manufacturers often lack the expertise and experience nee… Continue reading Regulators are coming for IoT device security