Viakoo Blog

Posts about

IoT

How To Hack The Kremlin? Cameras, Of Course.

Hackers have many types of attack vectors at their disposal when launching a cyberwar; there are over 170,000 known vulnerabilities that can be exploited in attacks against a wide range of devices and systems. So many that it raises the question of where do threat actors start in choosing what vulnerabilities to exploit? When the hacker group Anonymous announced they were declaring a cyberwar against Russia in response to their invasion of Ukraine it presented a real-life answer to which cyber weapons would you choose to go to war with. And no surprise, the attacks involved exploiting vulnerable IP cameras. Starting in early March, Anonymous has hacked into hundreds of IP cameras in Russia, including inside the Kremlin, and has used that access to distribute messages to the Russian people, gain military recognizance, and move laterally to impact other systems. Those efforts are continuing and expanding as this blog is being written.

Cybernews Interview With Viakoo CEO Bud Broomhead

This interview originally appeared in CyberNews

The Wave of Open Source Vulnerabilities  (That Becomes a Tsunami of Remediation)

Vulnerabilities tied to open source components have been increasing over the few years and...

Log4j and IoT Need for Urgent Action

The recently discovered cyber vulnerability in Apache Log4j, a widely used open source Java...

Cybersecurity First

As National Cybersecurity Awareness Month comes to an end, the last of the weekly themes is...

How Remediation Deficits Can Lead to Disaster

Cyber criminals and cybersecurity professionals have been at war for many years; battles are hard...

ThroughTek, Round 2:  Need for Automated Remediation

Today’s news I had to read twice – devices using a ThroughTek chipset contain a significant...

ThroughTek P2P Vulnerability Puts Spotlight on IoT Remediation

This past week a significant vulnerability was found in several different makes and models of IP...

Colonial Pipeline Cyberattack – Will This One Spur Action?

The ransomware attack and subsequent shutdown of the Colonial Pipeline system on the U.S. East...

Breaking the Cyber Kill Chain

Many cyber security professionals rely on process and methodology to ensure they are as effective...
Prev 1 2 3 Next