article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Sundaresan Bindu Sundaresan , Cybersecurity Director, LevelBlue In 2025, cybercriminals will exploit supply chain vulnerabilities, ransomware, IoT botnets, and AI-driven phishing. Rising IoT use demands standards to prevent device weaponization, while AI-enabled phishing challenges defenses. million (NIST, WEF).

article thumbnail

Space Systems and IoT: What Are the Biggest Cyber Threats?

Lohrman on Security

In this interview with Dick Wilkinson, CTO at Proof Labs, we explore the cyber threats in space and on the Internet of Things, and how they impact each of us.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Tech Republic Security

Zscaler ThreatLabz report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero trust security.

IoT 184
article thumbnail

From Sensors to Servers: End-to-End Security for IoT in Critical Utility Networks

SecureWorld News

A connected world means a vulnerable world Utilities now rely on large networks of IoT devices, from sensors buried underground to servers that crunch data in remote locations. But the moment we bring IoT into the mix, we create thousands of potential entry points for attackers.

IoT 111
article thumbnail

The Battle Against IoT Cyber Threats

Security Boulevard

The rapid increase of the Internet of Things (IoT) technology has transformed the world in many ways. From home automation to industrial control systems, IoT has become an integral part of our daily lives. In this blog post, we will […] The post The Battle Against IoT Cyber Threats appeared first on PeoplActive.

article thumbnail

Akira ransomware gang used an unsecured webcam to bypass EDR

Security Affairs

They found unsecured IoT devices, including webcams and a fingerprint scanner, using them to bypass security defenses and successfully deploy the ransomware. The IoT device was running a lightweight Linux OS, that was the perfect target for Akiras Linux ransomware variant. ” reads the report published by the S-RM team.

article thumbnail

Threat Landscape Report: Uncovering Critical Cyber Threats to Hospitality and Recreation

Digital Shadows

Lets dive into the key findings from this period and explore how organizations in this sector can strengthen their defenses against rising cyber threats. By targeting IoT devices such as smart slot machines and security cameras, Akira bypasses traditional endpoint detection and response (EDR) systems.