article thumbnail

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

Security Affairs

The STRONTIUM Russia-linked APT group is compromising common IoT devices to gain access to several corporate networks. Researchers at Microsoft observed the Russia-linked APT group STRONTIUM abusing IoT devices to gain access to several corporate networks. ” reads the analysis published by Microsoft.

IoT 76
article thumbnail

Roadmap for the Data Gold Rush: Maintaining Qualitative Data in the IoT Environment

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is the network of objects that can connect to each other via Wi-Fi, Bluetooth or any other communication protocol. Via the IoT, threats are moving from the digital to the physical realm and the targets of malware are multiplying. According to John Fruehe ( Forbes Magazine ), “IoT is about data, not things”.

IoT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Devices Lead to Suspect’s Arrest for Murder: eDiscovery Trends

eDiscovery Daily

And, if your DNA doesn’t get you, an Internet of Things (IoT) device may, as evidenced in this case. Of course, those “nearby cameras” could themselves be IoT devices (Ring doorbell, anybody?). Needless to say, IoT devices are becoming more and more prominent in criminal investigations and discovery. So, what do you think?

IoT 38
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

His news analysis columns, podcasts, and videos are crafted to foster a useful understanding of complex privacy and cybersecurity developments for company decision-makers and individual citizens — for the greater good. Byron: Companies often underestimate threats, neglect basic cyber hygiene, and fail to educate employees on cybersecurity.

article thumbnail

New XORDDoS, Kaiji DDoS botnet variants target Docker servers

Security Affairs

XORDDoS, also known as XOR.DDoS , first appeared in the threat landscape in 2014 it is a Linux Botnet that was employed in attacks against gaming and education websites with massive DDoS attacks that reached 150 gigabytes per second of malicious traffic. ” reads the analysis published by Trend Micro. .

IoT 121
article thumbnail

ENISA – The need for Incident Response Capabilities in the health sector

Security Affairs

The European Union Agency for Cybersecurity (ENISA) published an analysis of the current state of development of sectoral CSIRT capabilities in the health sector since the implementation of the NIS Directive. An attack against a hospital can lead to physical damages and put the lives of patients at risk. ” reads the report.

article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

There are many types of cyberattacks , with top trends for 2022 including mobile attacks, ransomware, COVID-related scams and hacks, zero-click attacks , malicious QR codes , phishing , cryptojacking , and IoT malware attacks, among others. Educating and training employees is a must-do in modern endpoint security. Ransomware.