Complete Guide to XIoT Security

| | iot
The Extended Internet of Things (XIoT) is a comprehensive term covering all connected cyber-physical systems. It is not just the traditional “Internet of Things” (IoT) devices you might think of, like smart ...
a USB drive

A Major Industrial Cybersecurity Threat: Living off the Land Attacks

In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Security Boulevard

CISA D-Link Router Vulnerabilities Being Actively Exploited

On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security vulnerabilities affecting D-Link routers to its CISA Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation. Federal agencies ...
Some happy, smiling DPRK military men

North Korea IT Worker Scam Brings Malware and Funds Nukes

WTH? DPRK IT WFH: Justice Department says N. Korean hackers are getting remote IT jobs, posing as Americans ...
Security Boulevard
PKI-Based Passkeys

PKI-Based Passkeys Lead The Way For A Passwordless Future

Recently, on World Password Day (May 2nd), tech giant Google revealed that Google Passkeys are being used by more than 400 million user accounts worldwide, authenticating users more than 1 billion times ...
Get a demo

IoT Vulnerabilities and BotNet Infections: A Risk for Executives

The Internet of Things (IoT) has become a cornerstone of business innovation and efficiency. However, the rapid proliferation of IoT devices also introduces significant cybersecurity risks, particularly in the form of IoT ...

RSAC 2024 Day 2: IoT Security Questions (and Answers)

RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot ...

RSAC 2024: IoT Security Questions (and Answers)

The 2024 RSA Conference is underway, and Viakoo is out in force.  During the conference as we meet with customers, prospects, media, and analysts I will try to cherry pick some of ...