SIEM as a Service

Dutch Police Seized Bulletproof Hosting Used to Control DDoS Botnets

Dutch police have taken down five servers offline that used to control botnet service, all the hardware was seized and actors behind the service were arrested. National Criminal Investigation tracked down the location of the...

Muhstik Botnet Attack & Harvests Vulnerable Linux-based Tomato Routers To Perform DDOS Attacks

Researchers discovered a new variant of Muhstik IoT Botnet that targets the vulnerable Linux-based Tomato routers to perform DDOS Attack, launch cryptocurrency mining to earn profits, and harvest the new IoT devices. Tomato is an open-source...
Hackers Breach The FSB Contractor and leaked a Document of IoT Cyber Weapons Development

Hackers Breach The FSB Contractor and leaked a Document of IoT Cyber Weapons Development

Recently, the well-known hacker group "Digital Revolution", has published documents outlining an acquisition order from a division of Russia's Federal Security Service (FSB) for the construction of "Fronton" software that would allow cyberattacks utilizing...
Zero Trust in the Interconnected Age of IoT – Eliminating Enterprise Cyber Security Risks

Zero Trust in the Interconnected Age of IoT – Eliminating Enterprise Cyber Security Risks

Internet networks have expanded far beyond the world of traditional desktop computers. Today, we rely on Google Nest to raise or lower the temperature in our house, on Alexa to play music just by...
Best IoT Security Tools

10 Best IoT Security Tools – 2025

IoT security tools are used to protect IoT devices from cyber Attacks. Any physical device that can connect to the internet falls under the definition of an IoT device. Everything from small household cookware to...
IoT Device Definition Types And The Four Most Popular In 2023

IoT Device Definition Types And The Four Most Popular In 2023

IoT - the global phenomenon which has taken the world by storm in 2023 was first coined in 1999 by Kevin Ashton. But since management consulting company Gartner listed IoT, more and more people,...
CISA

CISA Releases Guidance to Protect Firewalls, Routers, & Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international cybersecurity authorities, has issued comprehensive guidance aimed at securing network edge devices.  These devices, which include firewalls, routers, VPN gateways, Internet of Things (IoT)...
How to Control IoT Device Remotely

How to Control IoT Device Remotely

While many companies focus on implementing IoT, managing these interconnected devices is the real challenge. As you tread deeper into connected technology, understanding how to control your devices remotely becomes extra important. This article...
300,000 Chinese Devices in US : 40% Increase Despite Official Bans

300,000 Chinese Devices in US : 40% Increase Despite Official Bans

Chinese devices are suspected of administering cyber espionage due to concerns over potential backdoors, supply chain vulnerabilities, and the risk of tampering.  State-sponsored cyber threats, such as viral memes, are becoming more frequent. Chinese devices have...
Critical Flaws In Cinterion Cellular Modems Let Attackers Execute Remote Code

Critical Flaws In Cinterion Cellular Modems Let Attackers Execute Remote Code

A few Critical vulnerabilities have been discovered in Cinterion Cellular modems that could allow an unauthorized remote attacker to execute arbitrary code on the affected devices and escalate their privileges. There have been millions of...
SIEM as a Service

Recent Posts

New Device Code Phishing Attack Exploit Device Code Authentication To Capture...

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known as "device code phishing" to capture authentication tokens. This attack,...