article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting IoT devices and how? The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved.

IoT 84
article thumbnail

Shellbot Botnet Targets IoT devices and Linux servers

Security Affairs

Security experts at Trend Micro have spotted an IRC bot dubbed Shellbot that was built using Perl Shellbot. “The group distributes the bot by exploiting a common command injection vulnerability on internet of things (IoT) devices and Linux servers. . ” reads the analysis published by TrendMicro. Pierluigi Paganini.

IoT 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. I spoke with Greg Young, Cybersecurity Vice President at Trend Micro about this. I spoke with Greg Young, Cybersecurity Vice President at Trend Micro about this. We met at RSA 2020 in San Francisco.

Cloud 162
article thumbnail

Android Botnet leverages ADB ports and SSH to spread

Security Affairs

Trend Micro recently discovered an Android crypto-currency mining botnet that can spread via open ADB (Android Debug Bridge) ports and Secure Shell (SSH). Security researchers at Trend Micro have discovered an new Android crypto-currency mining botnet that spreads via open ADB ( Android Debug Bridge ) ports and Secure Shell (SSH).

Mining 69
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

However, when analyzed by new algorithmic data mining methods, big data can reveal patterns, trends, and associations that can, among other things, relate to human behavior and interactions. Merriam-Webster defines big data as “an accumulation of data that is too large and complex for processing by traditional database management tools.”

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Endpoint: Enables access for human users and computer services and commonly includes PCs, laptops, Internet of Things (IoT), and operational technology (OT). Internet of Things (IoT) security: Encompasses a variety of tools and techniques to secure IoT, operations technology (OT), and other similar categories of endpoints.

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

For modern networks, the introduction of new endpoints – be it remote laptops for personnel or client IoT devices – is a roadblock being actively addressed. While cybersecurity trends like zero trust push the focus inward, organizations must always consider endpoint vulnerabilities. Types of Endpoints Matter. Block Armour.