Risks in Telecommunications IT

Credit to Author: Craig Gibson| Date: Thu, 29 Jul 2021 00:00:00 GMT

We summarize the characteristics, threats, and recommendations to improve the security posture of enterprises’ and telecommunications companies’ IT infrastructure.

Read more

UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root

Credit to Author: Pieter Arntz| Date: Wed, 28 Jul 2021 13:04:39 +0000

Researchers found 11 vulnerabilities in IP camera firmware, but the vendor refused to work with them. As a result users are left wondering whether their camera’s can be taken over remotely.

Categories: Exploits and vulnerabilities

Tags:

(Read more…)

The post UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root appeared first on Malwarebytes Labs.

Read more

ETSI Publishes IoT Testing Specs for MQTT, COAP


On June 25, 2021, ETSI released its new IoT Testing Specifications completed by the organization’s committee on Methods for Testing and Specifications. The documents contain seven standards addressing the testing of the IoT MQ Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) protocols and the foundational security IoT-Profile.

Read more

Top Countries With ICS Endpoint Malware Detections

Credit to Author: Matsukawa Bakuei| Date: Wed, 30 Jun 2021 00:00:00 GMT

The Trend Micro research paper, “2020 Report on Threats Affecting ICS Endpoints,” presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections.

Read more