- Cisco bug lets anyone login to network as admin with a blank password
- Intel ships new Spectre patches: Kaby Lake and Coffee Lake now, Sandy Bridge next
- As NDB kicks in, be careful of overcompensating for past security inaction
- On the eve of game-changing NDB scheme, 59 percent of businesses still don’t understand it
- Google reveals kernel, Windows 10 security bypasses fixed in February’s Patch Tuesday
The hunt for IOT | The networks building deathstar-sized botnets from IOT minions
For over a year now, F5 Labs and our data partner, Loryka, have been monitoring the ongoing hunt by attackers to find vulnerable IoT devices they can compromise. In our first report, DDoS’s Newest Minions: IoT Devices, our research proved what many security experts had long suspected: IoT devices were highly vulnerable to exploit, the level of interest in exploiting them was high, and distributed denial-of-service (DDoS) attacks using these devices were already occurring. Our findings and conclusions in Volume 11 rang true, and the new numbers show even steeper growth than we had imagined.