SIEM as a Service
IoT Device Definition Types And The Four Most Popular In 2023

IoT Device Definition Types And The Four Most Popular In 2023

IoT - the global phenomenon which has taken the world by storm in 2023 was first coined in 1999 by Kevin Ashton. But since management consulting company Gartner listed IoT, more and more people,...

Muhstik Botnet Attack & Harvests Vulnerable Linux-based Tomato Routers To Perform DDOS Attacks

Researchers discovered a new variant of Muhstik IoT Botnet that targets the vulnerable Linux-based Tomato routers to perform DDOS Attack, launch cryptocurrency mining to earn profits, and harvest the new IoT devices. Tomato is an open-source...
Zero Trust in the Interconnected Age of IoT – Eliminating Enterprise Cyber Security Risks

Zero Trust in the Interconnected Age of IoT – Eliminating Enterprise Cyber Security Risks

Internet networks have expanded far beyond the world of traditional desktop computers. Today, we rely on Google Nest to raise or lower the temperature in our house, on Alexa to play music just by...
What Is The Current State Of IoT Security?

What Is The Current State Of IoT Security?

The Internet of Things (IoT) continues to expand, embedding itself into more sectors than ever before. With its growth, however, comes increased risk and exposure to security threats. Recent reports highlight the pressing need...
Critical Flaws In Cinterion Cellular Modems Let Attackers Execute Remote Code

Critical Flaws In Cinterion Cellular Modems Let Attackers Execute Remote Code

A few Critical vulnerabilities have been discovered in Cinterion Cellular modems that could allow an unauthorized remote attacker to execute arbitrary code on the affected devices and escalate their privileges. There have been millions of...
How Technology Can Enhance The Quality Of Our Life

How Technology Can Enhance The Quality Of Our Life

Tech solutions are here to facilitate a lot of tasks and streamline multiple processes. While today there are a lot of tech solutions implemented by enterprises that help them to increase the efficiency and...
Hackers Breach The FSB Contractor and leaked a Document of IoT Cyber Weapons Development

Hackers Breach The FSB Contractor and leaked a Document of IoT Cyber Weapons Development

Recently, the well-known hacker group "Digital Revolution", has published documents outlining an acquisition order from a division of Russia's Federal Security Service (FSB) for the construction of "Fronton" software that would allow cyberattacks utilizing...
IoT Security Tools

Top 10 Best IoT Security Tools – 2024

Introduction : IoT security tools are used to protect IoT devices from cyber Attacks. Any physical device that can connect to the internet falls under the definition of an IoT device. Everything from small household cookware...
FBI Warns Of HiatusRAT Attacking Web Cameras & DVRs To Gain Full Access

FBI Warns Of HiatusRAT Attacking Web Cameras & DVRs To Gain Full Access

The Federal Bureau of Investigation (FBI) has issued a Private Industry Notification (PIN) alerting cybersecurity professionals and system administrators about a new threat targeting web cameras and digital video recorders (DVRs). The malware, known...
Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations

Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations

The giant global electricity network intercrosses the fast-growing solar power infrastructure and ubiquitous Internet of Things, making a complex point of energy and data. This intersection relies on vulnerable inverters and controllers—key elements that may...
SIEM as a Service

Recent Posts