Category: Internet of Things

  • Blog
  • Category: Internet of Things
Bluetooth Bugs Open Billions Of Devices To DOS, Code Execution

Bluetooth Bugs Open Billions Of Devices To DOS, Code Execution

The bluetooth bugs found were reported to the appropriate vendors. Several of them were already patched and the others are in the process of being replicated. In addition, Espressif System and Xiaomi have offered bug bounties for four of the BrakTooth vulnerabilities. According to a search of the Bluetooth listing, BrakTooth impacts about 1400 product listings. In the closed BT stack, BrakTooth reveals fundamental attack avenues.

Read More
How to Build an Efficient Cybersecurity Compliance Plan

How to Build an Efficient Cybersecurity Compliance Plan

Cybersecurity Compliance refers to meet multiple controls which can secure the availability, integrity, and confidentiality of sensitive information.

Read More
Vulnerabilities Reported In Sage X3 Enterprise Management Software

Vulnerabilities Reported In Sage X3 Enterprise Management Software

In the Sage X3 ERP (enterprise resource planning), four security limitations have been uncovered. The researchers discovered them at Rapid7.

Read More
Smart Building and the Need for Cybersecurity

Smart Building and the Need for Cybersecurity

Smart technology is everywhere, literally, from your phone to your laptop, to your doorbells and CCTVs. These technologies have made their way deep into our lives. We spend more time staying online and connected than ever, and with the advent of COVID, our lives have depended on the internet and smart technologies more than ever.

Read More