Trending

#iotsecurity

Latest posts tagged with #iotsecurity on Bluesky

Latest Top
Trending

Posts tagged #iotsecurity

Sammy Hacked 7,000 ROMO Vacuums. DJI Paid Him.

Sammy Hacked 7,000 ROMO Vacuums. DJI Paid Him.

A PS5 controller revealed 7,000 DJI Romo vacuums streaming strangers' homes.

A security researcher reported it; DJI paid $30,000 and patched a PIN flaw — but certified devices still leaked live video, audio and floor maps.

Who’s protecting our connected homes?

#IoTSecurity

0 0 1 0
Post image

ELECQ EV Charger Firm Hit By Ransomware
Read More: buff.ly/OpuHuZq

#RansomwareAttack #EVsecurity #CloudBreach #CustomerData #CyberIncident #IoTSecurity #DataProtection #Infosec

1 0 0 0
Preview
CVE-2026-24448: Use of hard-coded credentials in Micro Research Ltd. MR-GM5L-S1 CVE-2026-24448 identifies a critical security vulnerability in Micro Research Ltd.'s MR-GM5L-S1 and MR-GM5A-L1 devices, specifically due to the presence of hard-coded credentials within the firmware versions prior to v2.01.04N1_02. Hard-cod

CRITICAL: Micro Research MR-GM5L-S1/MR-GM5A-L1 devices before v2.01.04N1_02 let attackers in via hard-coded creds. Immediate firmware update needed! 🚨 radar.offseq.com/threat/cve-2026-24448-us... #OffSeq #CVE #IoTSecurity

0 0 0 0
Preview
CVE-2026-27842: Authentication Bypass Using an Alternate Path or Channel in Micr CVE-2026-27842 is a critical authentication bypass vulnerability identified in Micro Research Ltd.'s MR-GM5L-S1 and MR-GM5A-L1 devices, specifically affecting firmware versions prior to v2.01.04N1_02. The vulnerability arises from the devic

CRITICAL: Auth bypass (CVE-2026-27842) in MR-GM5L-S1 & MR-GM5A-L1 (firmware < v2.01.04N1_02). Patch now & segment networks to prevent config tampering. radar.offseq.com/threat/cve-2026-27842-au... #OffSeq #Vulnerability #IoTSecurity

0 0 0 0
Preview
CVE-2026-28806: CWE-285 Improper Authorization in nerves-hub nerves_hub_web CVE-2026-28806 is an improper authorization vulnerability (CWE-285) found in the nerves_hub_web component of the nerves-hub project, affecting versions from 1.0.0 up to but not including 2.4.0. The vulnerability arises due to missing author

CRITICAL in nerves_hub_web ≤2.3.x: Authenticated users can hijack devices/orgs via improper authorization. Upgrade to 2.4.0+ now & review access controls. radar.offseq.com/threat/cve-2026-28806-cw... #OffSeq #IoTSecurity #PatchNow

0 0 0 0

🔒 Change default passwords on your IoT devices to strong, unique passwords. This simple step can significantly enhance your home network security! 🛠️ #IoTSecurity

15 2 5 0
Preview
CVE-2026-3811: Stack-based Buffer Overflow in Tenda FH1202 A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed

Tenda FH1202 (v1.2.0.14) faces a HIGH severity stack buffer overflow (CVE-2026-3811). Public exploit enables remote attack. Isolate devices and monitor for updates. radar.offseq.com/threat/cve-2026-3811-sta... #OffSeq #Vulnerability #IoTSecurity

0 0 0 0
Preview
CVE-2026-3768: Stack-based Buffer Overflow in Tenda F453 CVE-2026-3768 is a stack-based buffer overflow vulnerability identified in the Tenda F453 router firmware version 1.0.0.3. The vulnerability resides in the formWrlExtraSet function, specifically in the /goform/WrlExtraSet endpoint, where th

Tenda F453 (v1.0.0.3) HIGH severity stack buffer overflow — remote exploit possible, public PoC released. Update firmware or limit remote access now. radar.offseq.com/threat/cve-2026-3768-sta... #OffSeq #Vulnerability #IoTSecurity

0 0 0 0
Discover the hardware pentesting revolution : The MACOBOX
Discover the hardware pentesting revolution : The MACOBOX *Some features shown are in beta and will be fully functional soon. Stop fighting cables. Macobox gives you a step-by-step process: FCCID OSINT, AI Photo Scan, smart connect (UART/SPI/I²C/SWD/JTAG/eMMC), one-click dumps, AI log analysis (“Chat with the Target”), deep scans, clean exports, and one-click reports. It’s faster, deeper, and repeatable—every job. 👉 Get MACOBOX at LAB401.com: https://lab401.com/products/macobox-hardware-pentest-platform 👍 Like, share, and subscribe for more hardware security content. What you’ll learn in this video Problem → solution: From cable chaos to a clean, repeatable workflow. OSINT first: Enter FCCID to pull filings, photos, and docs; use AI Photo Scan to ID chips and fetch datasheets. Smart connect: Auto-detect UART, SPI, I²C, SWD, JTAG, eMMC; safe voltages; built-in multimeter info. One-click dump: Reliable SPI/eMMC extraction—no guesswork. Chat with the Target: AI explains boot logs, maps memory, highlights entry points. Project workflow: Auto-organized artifacts; export bundles with binaries, logs, notes, photos. One-click reports: Generate clean, professional vulnerability reports. Chat with Project: Ask about risks, coverage, next steps—AI answers from your project context. Portable lab: 1.5 GHz Cortex-A53, 4 GB RAM, 256 GB storage, USB/LAN/Wi-Fi/Bluetooth; battery powered. In the box: Macobox, PCBite with SQ10 probes, eMMC reader, SPI clips, SOP sockets, jumpers, pen-style multimeter, precision screwdriver + opening kit, PSU, spare plate. Plans: Basic (free), Premium (€2k/yr), Pro (contact us). Chapters 00:00 Cable chaos vs. results 00:32 The problem every pentester knows 01:04 From tool-driven to method-driven 01:21 What Macobox covers end-to-end 01:52 OSINT: FCCID + AI Photo Scan 02:38 Smart Connect: UART/SPI/I²C/SWD/JTAG/eMMC + safe voltages 03:08 One-Click Dump: SPI/eMMC firmware 03:38 Chat with the Target: AI log + memory analysis 04:27 Project Organization & Export 04:55 One-Click Reports 05:09 Chat with Project (context-aware AI) 06:17 Why it matters: speed, depth, repeatability 06:46 Portable specs (A53/4 GB/256 GB, I/O, battery) 07:14 What’s in the case 07:42 Standardized, shareable workflow 08:22 Consistency = success 09:14 Built by field researchers (Giuseppe, Matteo, Luca) 09:51 Plans: Basic / Premium / Professional 11:21 Core platform + annual plan tip 11:43 Call to action: streamline now 12:38 Like • Share • Subscribe Plan details (quick) Basic (free): Core workflow, lifetime updates, community help. Premium (~€2,000/yr): AI component + firmware tools, priority support, adapter upgrades, replacement probe boards. Pro (CONTACT US): All Premium + cloud vuln scans, reporting for teams, dashboards, SLA support. Why Macobox Cut setup time Go deeper with AI Keep everything organized Deliver client-ready reports, fast Roadmap: Macobox keeps evolving. New functionalities roll out regularly, and the roadmap is packed. Follow our official channels to catch new features as they drop.

Discover the hardware pentesting revolution: The MACOBOX
youtu.be/GHLmtduVlUE
#MACOBOX #Lab401 #HardwarePentest #FirmwareSecurity #PenTest #IoTSecurity

0 0 0 0
Preview
CVE-2026-3715: Stack-based Buffer Overflow in Wavlink WL-WN579X3-C CVE-2026-3715 is a stack-based buffer overflow vulnerability identified in the Wavlink WL-WN579X3-C router firmware version 231124. The vulnerability resides in the sub_40139C function within the /cgi-bin/firewall.cgi script, which processe

Wavlink WL-WN579X3-C routers (v231124) face a HIGH-severity stack overflow (CVE-2026-3715). Public exploit code — update to 20260226 firmware ASAP to stay secure. radar.offseq.com/threat/cve-2026-3715-sta... #OffSeq #Vulnerability #IoTSecurity

0 0 0 0

🔒 Change default passwords on all your IoT devices to strong, unique ones! This simple step can significantly enhance your home security. 🏠🔌 #IoTSecurity

1 0 1 1
Preview
The New Frontier of Conflict: When Security Cameras Become Weapons Iranian hackers exploited thousands of surveillance cameras in recent Middle East conflict. Security experts warn of fundamental governance failure.

The New Frontier of Conflict: When Security Cameras Become Weapons

#Cybersecurity #Surveillance #MiddleEast #IoTSecurity #AusNews

thedailyperspective.org/article/2026-03-07-the-n...

0 0 0 0
Preview
Hacked cameras become a weapon: how nations now weaponise video surveillance Iranian, Russian and Israeli actors are systematically hacking security cameras to guide missile strikes and assess damage. Here's what Australia needs to know.

Hacked cameras become a weapon: how nations now weaponise video surveillance

#Cybersecurity #CyberWarfare #IoTSecurity #AusNews #NationalSecurity

thedailyperspective.org/article/2026-03-06-hacke...

0 0 0 0
Privacy-Preserving Architectures for IoT & Vehicular Data Sharing: Survey

75-paper review validates privacy-efficiency-trust trilemma: FL accuracy collapses 90%→21% under Byzantine attack; FHE imposes 5.7–28.4× overhead; hybrid FL+HE+Blockchain achieves 93.2% accuracy with 30% comms reduction.

#IoTSecurity #FederatedLearning #PrivacyPreserving

0 0 0 0
Suspected Iranian Threat Actors Compromise IP Camera Feeds in Iran, Israel, the UAE, Qatar, Bahrain Iranian IP camera targeting exploits unpatched hardware vulnerabilities, possibly to support physical missile strikes in a growing cyber-physical conflict.

Full story:
www.technadu.com/suspected-ir...

How exposed is your IoT infrastructure? Comment your thoughts below.
#CyberSecurity #IoTSecurity #CyberConflict #ZeroTrust #ThreatIntel

0 0 0 0

The IoT and OT cyber fields are very interesting!

#offensivesecurity #CyberSecurity #iotsecurity #otsecurity

0 0 0 0
From Containment to Oversight, How Women Executives Lead With Facts in Cybersecurity Crises Jeanine Johnson, CEO, Co-Founder & Board Member at Immutaverse, discusses incident response, and practical strategies for boards and security teams.

Read more:
www.technadu.com/from-contain...

What questions should boards be asking security leaders today? Share your thoughts below 👇
#InternationalWomensDay #WomenInCyber #Cybersecurity #BoardGovernance #IoTSecurity #RiskManagement #LeadHerInSecurity #TechNadu

0 0 0 0
Preview
Wireless Security System Market Size, Share and Trends 2035 Wireless Security System Market is expected to reach USD 185.32 Billion at a CAGR of 9.57% by 2035, Global Wireless Security System Industry Growth by Type, End-Users, and Region

Wireless Security System Market Size, Share and Trends 2035 www.marketresearchfuture.com/reports/wire...
#WirelessSecurity #SmartSecurity #HomeAutomation #SurveillanceSystems #IoTSecurity #AccessControl

0 0 0 0
The DJI Romo hack shows the dangers that AI poses to the smart home

The DJI Romo hack shows the dangers that AI poses to the smart home

AI-assisted tinkering accidentally gave one researcher control of ~7,000 DJI Romo vacuums — cameras viewable, PIN locks bypassed — until DJI patched the token flaw.

If a hobbyist can hit a whole fleet, how long before someone malicious does?

#IoTSecurity

0 0 1 0
Preview
CVE-2026-27751: CWE-1392 Use of Default Credentials in Shenzhen Hongyavision Tec CVE-2026-27751 identifies a critical security flaw in the firmware of the SODOLA SL902-SWTGW124AS network gateway device produced by Shenzhen Hongyavision Technology Co., Ltd. The vulnerability stems from the presence of hardcoded default c

SODOLA SL902-SWTGW124AS gateways (≤200.1.20) have a CRITICAL flaw: default creds allow remote admin access. Change passwords now & restrict management access! radar.offseq.com/threat/cve-2026-27751-cw... #OffSeq #IoTSecurity #NetworkSecurity

0 0 0 0
Preview
CVE-2026-27755: CWE-330 Use of Insufficiently Random Values in Shenzhen Hongyavi The vulnerability CVE-2026-27755 affects the SODOLA SL902-SWTGW124AS device firmware versions up to 200.1.20, produced by Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks). It stems from the use of insufficiently random values in

🚨 CRITICAL vuln in SODOLA SL902-SWTGW124AS (≤200.1.20): Weak MD5 session IDs let attackers bypass auth. No patch — limit access, segment, and monitor now! radar.offseq.com/threat/cve-2026-27755-cw... #OffSeq #CVE202627755 #IoTSecurity

0 0 0 0

🔒 Change default passwords on your IoT devices to strong, unique passwords. This simple step can significantly enhance your home network security! 🛠️ #IoTSecurity

0 0 0 0
Preview
CVE-2026-3301: OS Command Injection in Totolink N300RH CVE-2026-3301 identifies a critical OS command injection vulnerability in the Totolink N300RH router, firmware version 6.1c.1353_B20190305. The vulnerability resides in the setWebWlanIdx function within the /cgi-bin/cstecgi.cgi component of

CRITICAL: Totolink N300RH (v6.1c.1353_B20190305) OS command injection — remote, unauthenticated exploit now public. Restrict access, monitor, patch ASAP. radar.offseq.com/threat/cve-2026-3301-os-... #OffSeq #CVE20263301 #IoTSecurity

0 0 0 0
Preview
AI Versus IoT Security: Fingerprinting and Defenses Against TLS Handshake-Based IoT Device Classification The number of Internet of Things (IoT) devices in smart homes is steadily increasing, enhancing convenience but also raising security concerns. While secure communication protocols like Transport Laye...

Expanding beyond DNS security to IoT privacy and fingerprinting: “AI Versus IoT Security: Fingerprinting and Defenses Against TLS Handshake-Based IoT Device Classification”
doi.org/10.1109/ACCE...

#IoTSecurity #NetworkSecurity

0 0 0 0
Preview
Bridging Biometrics and IoT: Redefining Trust in Connected Systems The Internet of Things (IoT) has matured into the backbone of modern infrastructure — powering smart homes, industrial automation…

I just published Bridging Biometrics and IoT: Redefining Trust in Connected Systems medium.com/p/bridging-b...
#Biometrics #IoTSecurity #Flutter #MQTT #smartdevices @seosiri.com

0 0 0 0

🔒 Change the default passwords on your IoT devices to strong, unique ones! Don't leave them vulnerable. #IoTSecurity 🛠️

0 0 0 0
Post image

$10K Bounty To Hack Ring Cameras
Read More: buff.ly/3vJTXfA

#RingSecurity #IoTSecurity #SmartHomePrivacy #AmazonDevices #DataProtection #HardwareHacking #PrivacyAdvocacy #CyberChallenge

0 0 0 0
Preview
CVE-2026-26341: CWE-1392 Use of Default Credentials in Tattile s.r.l. Smart+ CVE-2026-26341 is a vulnerability categorized under CWE-1392 (Use of Default Credentials) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families running firmware versions 1.181.5 and prior. The core issue is that these devices s

CRITICAL: Tattile Smart+, Vega, Basic (fw ≤1.181.5) use default credentials — admin access if exposed. Change passwords & limit interface access now! radar.offseq.com/threat/cve-2026-26341-cw... #OffSeq #IoTSecurity #Vulnerability

0 0 0 0
Post image

Biometric Locker Market Growth Analysis and Strategic Insights 2026 www.marketresearchfuture.com/reports/biom...
#BiometricLocker #AccessControl #SmartSecurity #AuthenticationTechnology #IoTSecurity #SecureStorage

0 0 0 0
Preview
CVE-2026-2981: Buffer Overflow in UTT HiPER 810G CVE-2026-2981 is a buffer overflow vulnerability identified in the UTT HiPER 810G device firmware versions up to 1.7.7-1711. The vulnerability stems from unsafe use of the strcpy function in the /goform/formTaskEdit_ap endpoint, specificall

🚨 HIGH: UTT HiPER 810G (≤1.7.7-1711) remote buffer overflow lets attackers execute code — no auth needed! Exploit is public, no patch. Restrict access & monitor traffic now. radar.offseq.com/threat/cve-2026-2981-buf... #OffSeq #IoTSecurity #Vulnerability

0 0 0 0