Mirai, first found in August 2016, wreaked havoc by taking advantage of insecure IoT devices. Hundreds of thousands of devices were enslaved to this malware, creating a massive botnet that was used to launch several crippling DDoS (distributed denial-of-service) attacks.
Zingbox IoT Guardian is the industry’s first and also the most widely deployed security and analytics platform. From its launch in 2014, we have taken a wholistic approach to device lifecycle management when securing and managing connected medical devices.
I just finished presenting at HIMSS19 Cybersecurity Command Center. As much as I hope attendees enjoyed an informative session, I personally enjoyed how much insight I took away from the audience. I wanted to take a few minutes now and
The Zingbox Security Research Team identified an IoT botnet campaign targeting Android-powered devices in November and December of 2018. The perpetrators dropped different variants that set up a backdoor to give themselves remote control of the victim and expand to
Robotic telepresence is a next-generation technology that allows a person in one location to replicate himself in another. The remote person can see you, hear you, interact with you, and move all around your location. But wait a second! What
A Hacker can learn important system and device details from the information available in error messages. By analyzing this information, the hacker can tailor the attack to exploit vulnerabilities associated with the OS and applications running on the device, greatly
As I speak with more and more customers regarding the management and security of IoT devices, it’s become abundantly clear that integration between various solutions is a critical component that’s often overlooked. That’s why I’m so excited about the Zingbox-Cisco
Ploutus is an ATM Malware discovered in 20131 that targets ATMs manufactured by NCR in Mexico., Since its discovery, the malware has been a nightmare for Latin America banks enabling criminals to steal more than $45 millions dollars.
Ploutus gained a
The terms “Hacker” and “Malware” are part of our daily vocabulary due to its significant impact on society, enterprises, and individuals alike. There is a good chance you or someone you know has been impacted by cyberattacks. These attacks come