• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices

You are here: Home / General Cyber Security News / IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices
October 13, 2022

IoT gadgets from online video conferencing systems to IP cameras are amid the five riskiest IoT equipment linked to networks, in accordance to research highlighted by Forescout’s cybersecurity investigate arm, Vedere Labs.

The company identified recurring themes in their recent research, highlighting the growing attack surface due to a lot more gadgets staying related to company networks, and how risk actors are capable to leverage these devices to realize their objectives.

“IP cameras, VoIP and video-conferencing systems are the riskiest IoT products due to the fact they are typically exposed on the internet, and there is a extensive heritage of danger actor action targeting them,” The Forescout report mentioned.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attack surface now encompasses IT, IoT and OT in pretty much each corporation, with the addition of IoMT in health care. Companies ought to be conscious of risky gadgets across all classes. Forescout recommends that automatic controls are put into practice and that businesses do not rely on siloed security in the IT network, OT network or for precise types of IoT gadgets.

This most current investigation gives an update to the company’s findings from 2020 in which networking tools, VoIP, IP cameras and programmable logic controllers (PLCs) were being detailed and continue being among the riskiest devices across IT, IoT, OT and IoMT in 2022.

Even so, new entries this kind of as hypervisors and human device interfaces (HMIs) are consultant of developments which include critical vulnerabilities and improved OT connectivity.

Vedere Labs analyzed system details involving January 1 and April 30 in Forescout’s Gadget Cloud. The anonymized information will come from Forescout consumer deployments and has details about pretty much 19 million products – a number that grows day-to-day, in accordance to the organization.

The total risk of a gadget was calculated dependent on three aspects: configuration, function and conduct.

Just after measuring the risk of every single particular person gadget, Vedered Labs calculated averages per gadget kind to fully grasp which are the riskiest.


Some sections of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News UK Government Urges Action to Enhance Supply Chain Security
Next Post: Does the OWASP Top 10 Still Matter? does the owasp top 10 still matter?»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.