article thumbnail

Maybe don’t call Saul? Over 30,000 VoIP devices identifiable worldwide, some with suspected vulnerabilities

Security Affairs

Our research shows that large and small manufacturers are identifiable, with Aastra-Mitel topping the list. Aastra-Mitel tops the manufacturer list, the United States leads the list among countries, and London tops the chart among cities. Devices made by the US manufacturer Polycom, a subsidiary of Plantronics Inc., What we did.

article thumbnail

APT Attacks & Prevention

eSecurity Planet

Threat groups have been tolerated in Russia, for example, in exchange for assurances that their hacking activity will be conducted in other countries. APT Examples. While APTs use various means to execute these stages, we can observe recent examples to understand the wide variety of attacks, creative techniques, and varied goals.

Access 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBot

Security Affairs

But let’s go back to the beginning of the story when my very good friend @0xrb found in his honeypot this new “ Mirai like ” Linux malware, which has important differences with the Mirai implementation. One of them, for example , is the C2 server. The beginning of the story: another IoT malware in the wild?

IoT 84
article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

For example, a laptop missing critical security updates, a jail-broken tablet, or a wi-fi enabled refrigerator connected in the break room without permission. Deception technology using honeypots and similar subterfuge can trigger alerts of both hackers and authorized users that might be attempting to perform malicious actions.

Security 106