#iotsecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #iotsecurity, aggregated by home.social.
-
📣 THE COUNTDOWN TO NEXUS IS ON
Join more than 250 CPS security leaders from global organizations in Washington, DC. as we tackle business resilience in the AI era.
With the cybersecurity industry at an inflection point, Nexus Conference 2026 is your opportunity to lead the way forward.
👉 Apply to attend: https://nexusconference.io
#Nexus2026 #cybersecurity #OTsecurity #IoTsecurity #industrial #healthcare #publicsector #commercial #AI #artificialintelligence #CISO
-
https://www.europesays.com/uk/958955/ Alliance urges EU to rethink cyber rules for SIM tech #CyberResilience #CyberResilienceAct(CRA) #Cybersecurity #DataProtection #DeviceSecurity #DigitalResilience #eSIM #EU #Europe #Europe(European) #European #EuropeanCommission #EuropeanUnion(EU) #infosec #InternetOfThings(IoT) #IoTSecurity #NetworkSecurity #sim #SoftwareUpdates #SupplyChainSecurity #SupplyChain #TrustedConnectivityAlliance
-
Alliance urges EU to rethink cyber rules for SIM tech
Trusted Connectivity Alliance has urged European standards…
#Europe #EU #Cyberresilience #CyberResilienceAct(CRA) #cybersecurity #Dataprotection #Devicesecurity #DigitalResilience #eSIM #Europe(European) #EuropeanCommission #EuropeanUnion #EuropeanUnion(EU) #Infosec #InternetofThings(IoT) #IoTSecurity #Networksecurity #SIM #SoftwareUpdates #SupplyChain #SupplyChainSecurity #TrustedConnectivityAlliance
https://www.europesays.com/europe/41684/ -
Defending consumer web properties against modern DDoS attacks | Microsoft Security Blog
Read on HackerWorkspace: https://hackerworkspace.com/article/defending-consumer-web-properties-against-modern-ddos-attacks-microsoft-security-blog
-
Industrial Cybersecurity Becomes Business-Critical Priority
Q: How is Claroty pos…
#Conflict #Conflicts #War #AI #Automation #CISO #Claroty #CloudComputing #cloudsecurity #criticalinfrastructure #cyberattacks #Cybersecurity #Data #Dataprivacy #DefensiveAI #digitaltransformation #healthtechnology #industrialcybersecurity #Industry4.0 #IoMT #IoTSecurity #ItaloCalvano #Latinamerica #México #nearshoring #OTcybersecurity #Regulation&Policy #SmartCities #technology
https://www.europesays.com/2970322/ -
HackRF PortaPack Splash Screen Without Removing the SD Card
-
HackRF PortaPack Splash Screen Without Removing the SD Card
-
HackRF PortaPack Splash Screen Without Removing the SD Card
-
HackRF PortaPack Splash Screen Without Removing the SD Card
-
Giving my Raspberry Pi LTE Connectivity - 4G LTE IoT Test Lab
-
Giving my Raspberry Pi LTE Connectivity - 4G LTE IoT Test Lab
-
Giving my Raspberry Pi LTE Connectivity - 4G LTE IoT Test Lab
-
Giving my Raspberry Pi LTE Connectivity - 4G LTE IoT Test Lab
-
Reflecting on Day 1 of the HTX CTF Finals here in Singapore.
I didn't win, but the technical takeaway was clear: Precision is a force multiplier.
By focusing on a high hit rate rather than just speed, I held 5th place for a good portion of the day. It’s a great reminder that in our field, being precise is a technical skill in itself.
Looking forward to the Day 2 challenges tomorrow!
#CTF #Cybersecurity #AISecurity #IoTSecurity #DEFCON #HTXsg #DEFCONSG #EthicalHacking #CaptureTheFlag #PublicSafety #HTXctf
-
🔒 CVE-2026-7031: HIGH-severity buffer overflow in Tenda F456 (v1.0.0.5). Remote, no user interaction needed. Exploit public, no patch yet. Limit device exposure & monitor for updates. More: https://radar.offseq.com/threat/cve-2026-7031-buffer-overflow-in-tenda-f456-f28ef6c0 #OffSeq #Vulnerability #IoTSecurity #NetSec
-
Open-Source AI Assisted Firmware Analysis - WAIRZ
-
The Rise of Autonomous Drone Swarms | VICE: Cyberwar | Blueprint
-
Qualified for HTX CTF Finals at DEF CON Singapore 🇸🇬 - 13th in the online round, 65/74 solved. 🔥
Both tracks were AI Security and IoT Exploitation. Neither is my daily work. Meant learning how prompt-driven systems break, how MQTT/CoAP expose attack surface, and how one forgotten device pivots into everything else.
All under the clock. ⏱️ Finals end of April. 💪
#CTF #Infosec #AISecurity #IoTSecurity #DEFCON #HTXsg #DEFCONSG #EthicalHacking #CaptureTheFlag #PublicSafety
-
IoT privacy compliance development.
Samsung will revise ACR data practices after legal action by the Texas Attorney General.Key elements:
• Real-time viewing habit collection under scrutiny
• Enhanced disclosure & consent flow promised
• Emphasis on consumer transparency
• Broader regulatory pressure on smart device telemetryACR data monetization highlights a persistent tension:
Device intelligence vs user autonomy
Advertising revenue vs explicit consent
Convenience vs continuous telemetry
As regulatory enforcement increases, IoT vendors may face stricter consent design expectations.
Question for security & privacy professionals:
Should connected consumer devices require periodic re-consent for telemetry collection?Source: https://therecord.media/samsung-updates-acr-privacy-practices-texas
Engage below.
Follow TechNadu for privacy law, IoT security, and compliance updates.
Repost to broaden awareness.#Infosec #PrivacyEngineering #ACR #IoTSecurity #DataGovernance #ConsumerPrivacy #RegulatoryCompliance #SmartDevices #CyberLaw #SecurityAwareness #DigitalRights
-
IoT privacy compliance development.
Samsung will revise ACR data practices after legal action by the Texas Attorney General.Key elements:
• Real-time viewing habit collection under scrutiny
• Enhanced disclosure & consent flow promised
• Emphasis on consumer transparency
• Broader regulatory pressure on smart device telemetryACR data monetization highlights a persistent tension:
Device intelligence vs user autonomy
Advertising revenue vs explicit consent
Convenience vs continuous telemetry
As regulatory enforcement increases, IoT vendors may face stricter consent design expectations.
Question for security & privacy professionals:
Should connected consumer devices require periodic re-consent for telemetry collection?Source: https://therecord.media/samsung-updates-acr-privacy-practices-texas
Engage below.
Follow TechNadu for privacy law, IoT security, and compliance updates.
Repost to broaden awareness.#Infosec #PrivacyEngineering #ACR #IoTSecurity #DataGovernance #ConsumerPrivacy #RegulatoryCompliance #SmartDevices #CyberLaw #SecurityAwareness #DigitalRights
-
IoT privacy compliance development.
Samsung will revise ACR data practices after legal action by the Texas Attorney General.Key elements:
• Real-time viewing habit collection under scrutiny
• Enhanced disclosure & consent flow promised
• Emphasis on consumer transparency
• Broader regulatory pressure on smart device telemetryACR data monetization highlights a persistent tension:
Device intelligence vs user autonomy
Advertising revenue vs explicit consent
Convenience vs continuous telemetry
As regulatory enforcement increases, IoT vendors may face stricter consent design expectations.
Question for security & privacy professionals:
Should connected consumer devices require periodic re-consent for telemetry collection?Source: https://therecord.media/samsung-updates-acr-privacy-practices-texas
Engage below.
Follow TechNadu for privacy law, IoT security, and compliance updates.
Repost to broaden awareness.#Infosec #PrivacyEngineering #ACR #IoTSecurity #DataGovernance #ConsumerPrivacy #RegulatoryCompliance #SmartDevices #CyberLaw #SecurityAwareness #DigitalRights
-
IoT privacy compliance development.
Samsung will revise ACR data practices after legal action by the Texas Attorney General.Key elements:
• Real-time viewing habit collection under scrutiny
• Enhanced disclosure & consent flow promised
• Emphasis on consumer transparency
• Broader regulatory pressure on smart device telemetryACR data monetization highlights a persistent tension:
Device intelligence vs user autonomy
Advertising revenue vs explicit consent
Convenience vs continuous telemetry
As regulatory enforcement increases, IoT vendors may face stricter consent design expectations.
Question for security & privacy professionals:
Should connected consumer devices require periodic re-consent for telemetry collection?Source: https://therecord.media/samsung-updates-acr-privacy-practices-texas
Engage below.
Follow TechNadu for privacy law, IoT security, and compliance updates.
Repost to broaden awareness.#Infosec #PrivacyEngineering #ACR #IoTSecurity #DataGovernance #ConsumerPrivacy #RegulatoryCompliance #SmartDevices #CyberLaw #SecurityAwareness #DigitalRights
-
UNC3886 leveraged ORB infrastructure for stealthy telecom targeting.
Per Cyber Security Agency of Singapore:
• Zero-day firewall compromise
• Rootkit persistence mechanisms
• GOBRAT & TINYSHELL C2 nodes
• ORB-tagged IP clustering in Singapore ASNs
• NetFlow-confirmed router-to-ORB communications
• Pre-positioned reconnaissanceAttribution aligned with assessments from Mandiant linking activity to China-sponsored espionage.
ORB networks blur the line between botnets and residential proxy ecosystems, increasing attribution friction and collateral risk.
Defensive priorities:
• Threat intel enrichment
• Edge device patch enforcement
• ASN anomaly detection
• Zero-trust segmentation
• IoT telemetry visibilityHow mature are ORB detection capabilities in your SOC?
Engage below.
Source: https://cyberpress.org/orb-networks-masks-attacks/
Follow @technadu for advanced threat analysis.
#ThreatIntel #UNC3886 #ORBNetworks #IoTSecurity #ZeroDay #C2Infrastructure #NetFlow #TelecomSecurity #BlueTeam #ThreatHunting #APTActivity #CyberOperations #Infosec
-
because this catches me every-time. hint to myself and any #security researcher out there.
Don't use GREP command on unix!Get ripgrep . It actually does what you think grep will do, on EVERY file.
"rg -uuu -i <whatever you're looking for>"
thank me later
#reverseengineering #disclosure #cybersecurity #securityresearch #iot #iotsecurity #softwareengineering
-
Nozomi Networks launches New Vantage IQ, a private AI assistant for OT and IoT security teams https://www.byteseu.com/1718549/ #AI #AIAssistant #ArtificialIntelligence #CriticalInfrastructure #CyberDefenses #CyberThreat #cyberattacks #IoT #IoTSecurity #Nozomi #OT #SOCAnalyst #ThreatLandscape #VantageIQ #vulnerability
-
A critical RCE vulnerability in legacy D-Link DSL routers allows unauthenticated attackers to execute arbitrary commands with root privileges.
With the devices now End-of-Life and no patch expected, immediate replacement is the only recommended mitigation.
#RCE #IoTSecurity #RouterSecurity #Infosec #VulnerabilityManagement
-
New ‘Broadside’ Botnet Poses Risk to Shipping Companies https://www.securityweek.com/new-broadside-botnet-poses-risk-to-shipping-companies/ #Malware&Threats #IoTSecurity #Broadside #IoTbotnet #botnet #DVR
-
🏠🔐 Your Smart Home Might Be Spying on You (And You Invited It In)
https://youtu.be/mCIGNYqPP2A #Cybersecurity #SmartHomeSecurity #PrivacyMatters #CyberAwareness #DigitalPrivacy #IoTSecurity #HomeNetworkSecurity #CyberHygiene #InfosecCommunity #DataProtection #SecureYourHome #DNS -
🚨 Massive surge in automated #botnet activity
→ Targeting PHP servers, IoT devices & cloud gateways
→ Mirai, Gafgyt, Mozi exploiting known CVEs
→ AWS & Google Cloud used to hide source
Experts warn: even low-skilled attackers can now wreak havoc with public exploit kits.💭 Thoughts on securing production environments from automated scans?
Follow @technadu for real-time #infosec updates & research drops.#CyberSecurity #Botnet #PHP #IoTSecurity #CloudSecurity #ThreatIntel #DevSecOps #Malware #VulnerabilityManagement #DigitalDefense
-
Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026 https://www.securityweek.com/over-3-million-in-prizes-offered-at-pwn2own-automotive-2026/ #Pwn2OwnAutomotive #Vulnerabilities #hackingcontest #IoTSecurity #carhacking #Pwn2Own
-
Securing Digital Payments: Challenges, Encryption, and Privacy Tech
#NewsUpturn #DataPrivacy #CyberSecurity #DigitalTrust #Egovernance #DigitalPayments #FintechSecurity #PrivacyMatters #TechPolicy #CyberThreats #DataProtection #DigitalIndia #SecureTransactions #PrivacyByDesign #CloudSecurity #IoTSecurity #BlockchainSecurity #ArtificialIntelligence #AIinSecurity #BigDataPrivacy #InformationSecurity
https://newsupturn.com/securing-digital-payments-challenges-encryption-and-privacy-tech/
-
Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/ #Mobile&Wireless #IoTSecurity #carhacking #Featured #CarPlay
-
Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/ #Mobile&Wireless #IoTSecurity #carhacking #Featured #CarPlay
-
Google Says Android pKVM Earns Highest Level of Security Assurance – Source: www.securityweek.com https://ciso2ciso.com/google-says-android-pkvm-earns-highest-level-of-security-assurance-source-www-securityweek-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #Mobile&Wireless #securityweekcom #MobileSecurity #certification #securityweek #IoTSecurity #Android #SESIP #pKVM #IoT
-
BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats https://www.securityweek.com/badcam-new-badusb-attack-turns-linux-webcams-into-persistent-threats/ #IoTSecurity #firmware #BadCam #BadUSB #Lenovo #USB
-
BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats https://www.securityweek.com/badcam-new-badusb-attack-turns-linux-webcams-into-persistent-threats/ #IoTSecurity #firmware #BadCam #BadUSB #Lenovo #USB
-
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking – Source: www.securityweek.com https://ciso2ciso.com/free-wi-fi-leaves-buses-vulnerable-to-remote-hacking-source-www-securityweek-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #securityweekcom #securityweek #IoTSecurity #carhacking #FEATURED #research #bus
-
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking https://www.securityweek.com/free-wi-fi-leaves-buses-vulnerable-to-remote-hacking/ #IoTSecurity #carhacking #research #bus
-
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking https://www.securityweek.com/free-wi-fi-leaves-buses-vulnerable-to-remote-hacking/ #IoTSecurity #carhacking #research #bus
-
Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/ #IoTSecurity #PerfektBlue #carhacking #Bluetooth #Featured
-
Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/ #IoTSecurity #PerfektBlue #carhacking #Bluetooth #Featured
-
“You think it’s just a light bulb—but it’s not off. It’s watching, listening… maybe even hacking.”
LMG Security’s @tompohl revealed how $20 smart outlets and light bulbs can be exploited for WiFi cracking, evil twin attacks, and stealth monitoring—turning everyday gadgets into real-world threats.
In our latest blog, we’ll share:
▪ How attackers can exploit everyday IoT gadgets to breach your organization
▪ Advice on how to lock down your smart tech
▪ Tips on segmentation, firmware auditing, and red teamingRead the blog: https://www.lmgsecurity.com/i-have-the-power-iot-security-challenges-hidden-in-smart-bulbs-and-outlets/
#IoTSecurity #Cybersecurity #SmartDevices #LMGSecurity #Cyberaware #IoT #Cyber #Tech #CISO #IT #PenetrationTesting #RogueDevices #BSidesDesMoines #Infosec #ITsecurity
-
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches https://www.securityweek.com/new-smartattack-steals-air-gapped-data-using-smartwatches/ #IoTSecurity #SmartAttack #smartwatch #Featured #airgap
-
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches https://www.securityweek.com/new-smartattack-steals-air-gapped-data-using-smartwatches/ #IoTSecurity #SmartAttack #smartwatch #Featured #airgap
-
Nissan Leaf Hacked for Remote Spying, Physical Takeover – Source: www.securityweek.com https://ciso2ciso.com/nissan-leaf-hacked-for-remote-spying-physical-takeover-source-www-securityweek-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #securityweekcom #securityweek #IoTSecurity #carhacking #NissanLeaf #FEATURED #Nissan
-
🚨 90% of UK industrial firms hit by cyberattacks this year
IoT vulnerabilities, insider threats, and OT risks are exposing critical systems in manufacturing, energy, and more.
💡 How to stay secure? RELIANOID ADC protects industrial IT infrastructure with:
✅ mTLS authentication
✅ Real-time threat blocking
✅ Zero-downtime updatesStrengthen your defenses today!
#Cybersecurity #IndustrialSecurity #RELIANOID #IoTSecurity #OTSecurity
https://www.relianoid.com/blog/strengthening-industrial-cybersecurity-nearly-90-of-uk-organizations-with-incidents/ -
Vulnerability Allowed Eavesdropping via Sonos Smart Speakers https://www.securityweek.com/vulnerability-allowed-eavesdropping-via-sonos-smart-speakers/ #vulnerability #IoTSecurity #eavesdrop #Sonos
-
Vulnerability Allowed Eavesdropping via Sonos Smart Speakers https://www.securityweek.com/vulnerability-allowed-eavesdropping-via-sonos-smart-speakers/ #vulnerability #IoTSecurity #eavesdrop #Sonos
-
Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover https://gbhackers.com/iot-device-vulnerabilities-lead-full-takeover/ #VulnerabilityDisclosure #Remotecodeexecution #CVE/vulnerability #CyberSecurityNews #IoTSecurity #IoT
-
The absolute best part of the #BigEar project is that I can just buy random #BLE sensors and throw them anywhere. Security is such a joke (its just broadcast) but the threat model is "someone driving past might notice that my pool is warm." 🤷 🌡️
(I do mean REALLY anywhere though, within about 4 yards/houses in most directions, using zero equipment outside the main house. Later I'll waterproof one and try it on the fence..)
Y'all shouldn't be buying #oralb toothbrushes or really ANY #bluetooth bathroom scale. Just saying. (And yes, I can probably see your growroom sensor too.)