article thumbnail

Kalay platform vulnerability exposes millions of IoT devices to cyber attacks

CyberSecurity Insiders

Cybersecurity Researchers from Mandiant have disclosed that millions of IoT devices operating across the globe were vulnerable to cyber attacks because of a flaw in Kalay Cloud platform software supplied by ThroughTek. ThroughTek has issued a fix of 3.1.10

IoT 142
article thumbnail

Brits Ban Default Passwords — and More IoT Stupidity

Security Boulevard

The post Brits Ban Default Passwords — and More IoT Stupidity appeared first on Security Boulevard. The UK’s Product Security and Tele­comm­uni­cations Infra­struc­ture Act aims to improve the security of net-connected consumer gear.

IoT 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kalay cloud platform flaw exposes millions of IoT devices to hack

Security Affairs

FireEye Mandiant researchers have discovered a critical vulnerability in the Kalay cloud platform that exposes millions of IoT devices to attacks. The flaw could be easily exploited by a remote attacker to take over an IoT device, the only info needed for the attack is the Kalay unique identifier (UID) of the targeted user.

IoT 122
article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

Persistent exploitation of legacy systems One of the most alarming aspects of Ghost ransomware is its focus on legacy IoT and OT environments. Cybersecurity awareness and incident response Train employees to recognize phishing attempts and social engineering. Enforce DMARC, DKIM, and SPF to prevent spoofing.

article thumbnail

Attackers Use 2.8 Million Devices in Major Brute Force Attack

Security Boulevard

million edge and IoT devices from around the world in a massive brute force attack that is targeting edge security systems from Palo Alto Networks, Ivanti, SonicWall, and other vendors, according to the Shadowserver Foundation. Threat actors are using as many as 2.8 The post Attackers Use 2.8

IoT 87
article thumbnail

Why Businesses Can’t Afford Anything Less Than Zero Trust in IoT

Security Boulevard

Why Businesses Can’t Afford Anything Less Than Zero Trust in IoT. The IoT Landscape and Threats. Considering the inherent insecurity of connected devices, the threats facing organizations today often involve weakly-defended IoT equipment as the first line of attack. brooke.crothers. Thu, 06/23/2022 - 16:26. Related Posts.

IoT 98
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 13

Security Affairs

How the Necro Trojan infiltrated Google Play, again Kryptina RaaS | From Unsellable Cast-Off to Enterprise Ransomware “Marko Polo” Navigates Uncharted Waters With Infostealer Empire Octo2: European Banks Already Under Attack by New Malware Variant Infostealer malware bypasses Chrome’s new cookie-theft defenses AI-Generated Malware Found in the Wild (..)

Malware 125