Botnet Takes Advantage of Cheap IoT Devices

Yes I am assuming IoT devices from china are ‘cheap’. Look at this FBI IC3 headline: Home Internet Connected Devices Facilitate Criminal Activity probably important to know – what is the Botnet? “BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android … Read more

Make Assessments and Prepare for the Unknown

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering hole tactic is where just like in the desert water is important , and in an oasis there is a watering hole. What does that … Read more

Social Engineer Attack examples: Texts and email

Here are some standard emails that came into my mailbox that are obviously fake….     Also an older post(7/15/2024) discussed  a tax refund scam… by text and email Here is text of email(italicized): Hi <insert-name>, Just wanted to check if you’ve submitted your tax refund claim yet? SETC and ERC are federal government programs … Read more

Another Router being exploited now: Archer TP-Link

Hackernews has another story about exploited devices: Archer routers  This router   the Archer TP link “The botnet exploits a remote code execution (RCE) vulnerability in TP-Link Archer routers (CVE-2023-1389) to spread itself automatically over the Internet,” security researchers Ofek Vardi and Matan Mittelman said in a technical report shared with The Hacker News.”   As … Read more