Topic: iot security
- 
Bitdefender & NETGEAR: Rising Threats to Your Connected Home
The average household now contains 22 connected devices and faces nearly 29 daily cyberattacks, a nearly threefold increase from the previous year, highlighting the growing threat to smart homes. Entertainment devices like streaming gadgets, smart TVs, and IP cameras are the most vulnerable, ofte...
Read More » - 
Bitdefender & NETGEAR: Rising Home Cybersecurity Threats
Modern homes face nearly triple the daily cybersecurity attacks compared to last year, with households averaging 22 connected devices and enduring about 29 attacks daily. Entertainment devices like streaming systems, smart TVs, and IP cameras are the most vulnerable, often unpatched and accountin...
Read More » - 
Is Solar Power Overwhelming the Grid?
Insecure domestic solar power systems pose a new threat to national electricity grids, as vulnerable control devices could be manipulated to cause synchronized power disruptions, according to a recent report. Common IoT devices like smart cameras are being exploited for privacy invasions, enablin...
Read More » - 
The Hidden Dangers of a Connected World
Cybersecurity risk has expanded beyond IT to include operational technology, IoT devices, and supply chains, requiring strategies like visibility and network segmentation for management. The risk landscape now centers on control planes and concentrated dependencies, where single points like ident...
Read More » - 
Nozomi Networks' Arc Release Boosts OT Security
Nozomi Networks has upgraded its Arc platform to include automated threat prevention for operational technology, enabling active defense of critical infrastructure without downtime. The enhancement introduces flexible prevention modes, OT-focused threat intelligence, and seamless integration with...
Read More » - 
Enhance Security with Netskope UZTNA's Dynamic Policy Controls
Netskope's Universal ZTNA platform now integrates Private Access and Device Intelligence, offering deeper threat inspection and enabling businesses to replace outdated technologies like VPNs and NACs. The solution extends protection to IoT and OT devices with built-in device intelligence and embe...
Read More » - 
300k+ Plex Servers Still Vulnerable to Attack, Git RCE Exploited
Over 300,000 Plex Media Server systems remain vulnerable to attack due to an unpatched critical flaw, risking media libraries and personal data. Multiple sectors face active threats, including Git systems exploited for remote code execution and NetScaler devices targeted via a zero-day vulnerabil...
Read More » - 
AI Adoption Fuels Surge in Critical Security Flaws
A significant surge in hardware, API, and network vulnerabilities is creating unprecedented risks, driven by IoT proliferation and resulting in an 88% increase in hardware flaws and a doubling of network vulnerabilities. The rapid integration of AI into software development is expanding the attac...
Read More » - 
Putting NICE Guidelines into Practice: Training Insights
SMBs can effectively train employees against cyber threats by focusing on a streamlined, scenario-based program derived from the NICE Framework, targeting the most common attacks like phishing, malware, and web-based threats. The training integrates technical skills with legal knowledge through r...
Read More » - 
Your Digital Footprint: How Geolocation Puts Your Privacy at Risk
Geolocation data from smartphones and apps creates a significant privacy risk, enabling cybercriminals to exploit traceable information for targeted attacks. These geofenced threats, like the Stuxnet worm, can remain dormant until reaching specific locations, making early detection difficult and ...
Read More » - 
ImmuniWeb Expands Discovery with ASM & Dark Web Monitoring
ImmuniWeb's Q3 update introduced over 500 enhancements, including two new specialized packages for its CTEM platform: Attack Surface Management and Dark Web monitoring. The ASM package offers real-time visibility and security testing for digital assets, while the Dark Web package provides daily t...
Read More » - 
PQC Adoption, Android Spyware, and FEMA Data Breach: Key Updates
Microsoft has enhanced its security products with AI-ready Sentinel and Security Copilot, enabling automated threat response and easier deployment through the Microsoft Security Store. Insider threats and data breaches were highlighted, including a bribery attempt on a BBC journalist and breaches...
Read More » - 
Cybercriminals Target Drug Formulas and Patient Data
Cybercriminals target pharmaceutical companies for valuable clinical trial data, patient records, and proprietary formulas, posing significant financial and public health risks. Data breaches in the sector average $4.61 million per incident, with ransomware and third-party vulnerabilities leading...
Read More »