Muhstik Botnet Attack & Harvests Vulnerable Linux-based Tomato Routers To Perform DDOS Attacks
Researchers discovered a new variant of Muhstik IoT Botnet that targets the vulnerable Linux-based Tomato routers to perform DDOS Attack, launch cryptocurrency mining to earn profits, and harvest the new IoT devices.
Tomato is an open-source...
What Is The Current State Of IoT Security?
The Internet of Things (IoT) continues to expand, embedding itself into more sectors than ever before. With its growth, however, comes increased risk and exposure to security threats.
Recent reports highlight the pressing need...
Critical Flaws In Cinterion Cellular Modems Let Attackers Execute Remote Code
A few Critical vulnerabilities have been discovered in Cinterion Cellular modems that could allow an unauthorized remote attacker to execute arbitrary code on the affected devices and escalate their privileges.
There have been millions of...
How to Control IoT Device Remotely
While many companies focus on implementing IoT, managing these interconnected devices is the real challenge. As you tread deeper into connected technology, understanding how to control your devices remotely becomes extra important. This article...