The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

The Evolution of IoT Linux Malware Based on MITRE ATT&CK TTPs

New IoT botnet techniques During the observation period, we noted four new techniques added to threat actors’ arsenals. One is a newly implemented technique in botnet families called Masquerading: Match Legitimate Name or Location (T1036.005). It is a Defense Evasion technique that likely reflect the manufacturers’ increasing interest and efforts in securing these IoT devices or appliances. The technique involves adversaries trying to match the name and location of legitimate and trusted programs to hide…

Read More

COP26 Backs Electric Vehicles to Reduce Climate Change

COP26 Backs Electric Vehicles to Reduce Climate Change

Last October 31, the 2021 United Nations Climate Change Conference started, tackling various ways on how countries plan to address the looming threat of climate change. During the event, electric vehicles (EVs) are expected to take center stage as one of the various ways countries can mitigate climate change. Also known as COP26, the 2021 edition is the 26th year that the conference parties to the United Nations Framework Convention on Climate Change. It is…

Read More

Private 5G Security Risks in Manufacturing Part 4

Private 5G Security Risks in Manufacturing Part 4

Private 5G Security Risks in Manufacturing Part 4 Exploits & Vulnerabilities We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. By: Yohei Ishihara November 12, 2021 Read time:  ( words) The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However,…

Read More
1 5 6 7