<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unsecured IoT in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Unsecured-IoT/m-p/27339#M1721</link>
    <description>&lt;P&gt;Microsoft made &lt;A href="https://www.forbes.com/sites/zakdoffman/2019/08/05/microsoft-warns-russian-hackers-can-breach-companies-through-millions-of-simple-iot-devices/#28ce6165617f" target="_blank" rel="noopener"&gt;news&lt;/A&gt; at last weeks Black Hat conference, generating a lot of buzz about its "discovery" of a malicious Russian hacker group "Strontium" using common IoT devices to carry out widespread attacks on corporate networks. Here's a list of 8 common vulnerabilities that are often found in IoT device firmware:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Unauthenticated access&lt;/LI&gt;&lt;LI&gt;Weak authentication&lt;/LI&gt;&lt;LI&gt;Hidden backdoors&lt;/LI&gt;&lt;LI&gt;Password hashes&lt;/LI&gt;&lt;LI&gt;Encryption keys&lt;/LI&gt;&lt;LI&gt;Buffer overflows&lt;/LI&gt;&lt;LI&gt;Open source code&lt;/LI&gt;&lt;LI&gt;Debugging services&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:19:02 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:19:02Z</dc:date>
    <item>
      <title>Unsecured IoT</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Unsecured-IoT/m-p/27339#M1721</link>
      <description>&lt;P&gt;Microsoft made &lt;A href="https://www.forbes.com/sites/zakdoffman/2019/08/05/microsoft-warns-russian-hackers-can-breach-companies-through-millions-of-simple-iot-devices/#28ce6165617f" target="_blank" rel="noopener"&gt;news&lt;/A&gt; at last weeks Black Hat conference, generating a lot of buzz about its "discovery" of a malicious Russian hacker group "Strontium" using common IoT devices to carry out widespread attacks on corporate networks. Here's a list of 8 common vulnerabilities that are often found in IoT device firmware:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Unauthenticated access&lt;/LI&gt;&lt;LI&gt;Weak authentication&lt;/LI&gt;&lt;LI&gt;Hidden backdoors&lt;/LI&gt;&lt;LI&gt;Password hashes&lt;/LI&gt;&lt;LI&gt;Encryption keys&lt;/LI&gt;&lt;LI&gt;Buffer overflows&lt;/LI&gt;&lt;LI&gt;Open source code&lt;/LI&gt;&lt;LI&gt;Debugging services&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:19:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Unsecured-IoT/m-p/27339#M1721</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:19:02Z</dc:date>
    </item>
  </channel>
</rss>

