IoT Security

Discover IoT Security News

How Edge Computing Secures Business Data from Cyber Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With the average number of weekly cyberattacks per company rising by 75% in Q3 of last year, the pursuit of effective cybersecurity is relentless in the ever-evolving threat landscape. And while the Internet of Things (IoT) may have introduced us to smart, hyperconnected devices, it’s also introduced a unique set of cybersecurity risks.

PumaBot Linux Botnet Targets IoT Devices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IoT devices have always been a juicy target for attackers—they’re often undersecured, overlooked, and ripe for exploitation. But here’s where PumaBot, a Go-based Linux botnet, stands out. It skips the chaotic "scan everything" approach and carefully chooses its targets with IP addresses fed from a command-and-control (C2) server. This isn’t a messy botnet that flails around hoping to get lucky; it’s calculated.

New Raspberry Pi OS Brings Key Security Updates

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Raspberry Pi OS has taken a big step forward with its latest update, built on Debian Bookworm. This isn’t just a routine refresh—it’s a deliberate shift toward the future. Changes are happening under the hood, some subtle, others bold, but they all contribute to keeping Raspberry Pi competitive and dependable in the fast-paced world of single-board computing.

New OpenWrt Flaws Fixed: Implications for Router Security & Mitigation Strategies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recently discovered vulnerabilities in OpenWrt, an open-source firmware for routers and embedded devices, have cast light on new network security flaws that admins, businesses, and home router users must be aware of. OpenWrt recently addressed critical security issues that allowed attackers to inject malicious commands or exploit hash collisions in its Imagebuilder tool on Attendedsysupgrade Server (ASU), potentially serving compromised images to unwitting users, thereby undermining network security on these routers. With wide use across enterprises, small businesses, and tech-savvy households, this discovery has massive implications for all using OpenWrt.

Ubuntu Pro for Devices: 10-Year Security Commitment in IoT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Canonical has launched Ubuntu Pro for Devices, a comprehensive offering emphasizing security and compliance for IoT device deployments. This initiative aims to provide 10 years of security maintenance for Ubuntu and thousands of open-source packages, along with device management capabilities through Landscape, a systems management tool by Canonical. Ubuntu Pro also ensures that IoT devices receive reliable security patches from a trusted source.

NKAbuse Malware Insights: Blockchain's Role in Linux IoT Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Threat actors are using blockchain technology to hide the presence of malware on Linux IoT devices. The Nkabuse malware uses a new method of hiding itself from detection: it stores its code in the Bitcoin blockchain. Every time an infected device communicates with the Bitcoin network, it sends a portion of its code with each transaction. This method allows Nkabuse to stay hidden even if it is discovered by a security researcher or neutralized by a patch.

Secure SSH Access And Web Portals For Raspberry Pi Devices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the rapidly evolving world of managing Internet of Things (IoT) devices, ensuring secure remote access to ssh iot devices behind firewalls and NAT routers is of utmost importance. This article explores remote IoT device management, focusing on the secure ways to access Raspberry Pi web devices remotely. We will delve into two key methods - SSH (Secure Shell) and web-based access, highlighting the benefits they offer in overcoming firewall and network address translation challenges.

New Mining Campaign Targets Linux And IoT Devices With Backdoor Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part of a new campaign designed to illicitly mine cryptocurrency. "The threat actors behind the attack use a backdoor that deploys a wide array of tools and components such as rootkits and an IRC bot to steal device resources for mining operations," Microsoft threat intelligence researcher Rotem Sde-Or said.