NewSky SecurityinNewSky SecurityInformation Disclosure Vulnerability CVE-2018-7900 Makes It Easy for Attackers to Find Huawei…Introduction: Not All Attack Vectors are Created Equal3 min read·Dec 19, 2018----
NewSky SecurityinNewSky SecurityTracking the People Behind Botnets: A List of Top 20 IoT Blackhat HackersWhile most people treat malware as just a piece of code, behind it is a human creating the content, and an entire ecosystem where the…7 min read·Oct 30, 2018----
NewSky SecurityinNewSky SecurityHacker Fail: IoT botnet command and control server accessible via default credentialsWe observed an IoT botnet variant, Owari, which relies on default/weak credentials to hack IoT devices was itself using default…4 min read·Jun 4, 2018----
NewSky SecurityinNewSky SecurityForgotDoor: Routers in Singapore accidentally give complete access to potential IoT attackersIoT attacks can be classified into three levels: Level 0 (attacking device with no authentication), Level 1 (guessing a weak/default passwor5 min read·May 28, 2018----
NewSky SecurityinNewSky SecurityCVE-2018–10561 Dasan GPON exploit weaponized in Omni and Muhstik botnetsIoT attackers are acting quickly on weaponizing one-day exploits, which are low hanging yet very delicious fruits. While discovering a…5 min read·May 8, 2018----
NewSky SecurityinNewSky SecurityYour Device Is My Miner: How Hackers Steal Your CryptocurrencyHow to mine a bitcoin? How to prevent hackers from stealing?Cryptocurrency security has played an increasingly critical role…5 min read·May 2, 2018--220--220
NewSky SecurityinNewSky SecurityCryptocurrency Mining Hacks: How Thefts Steal Bitcoin and EthereumCryptocurrency hacks are not limited in a single way. Dark web honeypots discovered attacks on mining hardware, software, and wallets…6 min read·Apr 24, 2018--1--1
NewSky SecurityinNewSky SecurityNewSky Security Co-Founder Accepted into Forbes Technology CouncilNewSky Security’s CTO and Co-Founder, Song Li, has been accepted into the Forbes Technology Council, an invitation-only community for…2 min read·Apr 23, 2018--2--2
NewSky SecurityinNewSky SecurityUnderstanding the IoT Hacker — A Conversation With Owari/Sora IoT Botnet AuthorAn IoT cybersecurity company security researcher gave an exclusive interview with an IoT hacker who created Owari and Sora botnets…6 min read·Apr 13, 2018----
NewSky SecurityinNewSky Security“StartWallet”: How not to lose money while cryptominingMake sure that your mining machines are not working for others’ wallets.4 min read·Mar 14, 2018----