Declaring War on Vulnerable IoT Devices

| | Blog
Real warfare and cyber warfare are merging closer together – just look at the role vulnerable IoT devices are playing in the war between Russia and Ukraine.  Since the conflict began there have been multiple reports of each side trying to gain an advantage by targeting both critical infrastructure and ... Read More

Getting Real About Realtek

| | Blog
Realtek is a well-regarded semiconductor chipset manufacturer based in Taiwan, with many of their chips used in IoT devices.  Along with the physical chips themselves, Realtek also provides firmware and software development kits to enable the devices to perform their functions and integrate into a variety of systems.  To IoT ... Read More

National Cybersecurity Awareness Month 2022

| | Blog
As we come to the end of National Cybersecurity Awareness Month it’s fair to ask how do you keep attention and awareness going through the rest of the year?  While it may not all be fun and games (that part comes at the end of this blog) there are some ... Read More

KillNet: DDoS, IoT/OT, and Critical Infrastructure

| | Blog
Yesterday’s reports of the Russian cyber criminal group KillNet bringing down websites of several airports might be seen as just another normal day when it comes to cybersecurity.  Mandiant reported that 15 airports were impacted, with most having their websites down for periods lasting up to a few hours.  For ... Read More

Shikitega: Anatomy of an IoT/OT Threat

| | Blog
This past week researchers at AT&T Alien Labs disclosed a new vulnerability aimed at IoT/OT devices, the Shikitega malware.  Shikitega is designed to compromise Linux and IoT devices of virtually any size; the main “dropper” of the malware is only 376 bytes (yes, bytes) and can be run on even ... Read More
Shortening Your IoT Vulnerability Window

Shortening Your IoT Vulnerability Window

| | Blog
When we talk with customers about what is driving them to automate IoT cyber hygiene one topic overshadows everything; shrinking the attack surface that their business-critical IoT systems have become.  It makes sense that IoT security has become a priority – compared to other potential attack surfaces in their organization ... Read More
The Scale Problem with IoT/OT Security

The Scale Problem with IoT/OT Security

| | Blog
Barracuda Networks recently published a study on IoT/OT security, and similar to what Viakoo hears when talking with prospects it validates there is a giant gap between the threats from vulnerable IoT systems being breached and an organization’s ability to stop it.  I’d encourage you to check it out here ... Read More
What I Learned at the Gartner Security & Risk Summit

What I Learned at the Gartner Security & Risk Summit

| | Blog
Gartner Security & Risk Summit I was fortunate to attend to the Gartner Security & Risk Summit which overlapped the RSA Conference (RSAC) this year and came away with a lot of insights (as well as some optimism) on the key challenges facing security teams in 2022.  While there is ... Read More
Ensure Your CMDB Reflects The True State of IoT

Ensure Your CMDB Reflects The True State of IoT

| | Blog
The threat landscape today is much different than just a few years ago, specifically with vulnerable IoT/OT/ICS devices and applications being exploited more frequently.  From the Board of Directors on down, organizations are being advised to make sure IoT is visible, operational, and secure – and to make sure they ... Read More
Log4j and IoT Need for Urgent Action

Log4j and IoT Need for Urgent Action

The recently discovered cyber vulnerability in Apache Log4j, a widely used open source Java software package, has created a need for organizations to urgently assess and remediate this vulnerability across all their systems, including IoT devices. This blog highlights why there must be a rapid response to this cyber threat, ... Read More