NewSky SecurityinNewSky SecurityInformation Disclosure Vulnerability CVE-2018-7900 Makes It Easy for Attackers to Find Huawei…Introduction: Not All Attack Vectors are Created EqualDec 19, 2018Dec 19, 2018
NewSky SecurityinNewSky SecurityTracking the People Behind Botnets: A List of Top 20 IoT Blackhat HackersWhile most people treat malware as just a piece of code, behind it is a human creating the content, and an entire ecosystem where the…Oct 30, 2018Oct 30, 2018
NewSky SecurityinNewSky SecurityHacker Fail: IoT botnet command and control server accessible via default credentialsWe observed an IoT botnet variant, Owari, which relies on default/weak credentials to hack IoT devices was itself using default…Jun 4, 2018Jun 4, 2018
NewSky SecurityinNewSky SecurityForgotDoor: Routers in Singapore accidentally give complete access to potential IoT attackersIoT attacks can be classified into three levels: Level 0 (attacking device with no authentication), Level 1 (guessing a weak/default passworMay 28, 2018May 28, 2018
NewSky SecurityinNewSky SecurityCVE-2018–10561 Dasan GPON exploit weaponized in Omni and Muhstik botnetsIoT attackers are acting quickly on weaponizing one-day exploits, which are low hanging yet very delicious fruits. While discovering a…May 8, 2018May 8, 2018
NewSky SecurityinNewSky SecurityYour Device Is My Miner: How Hackers Steal Your CryptocurrencyHow to mine a bitcoin? How to prevent hackers from stealing?Cryptocurrency security has played an increasingly critical role…May 2, 2018220May 2, 2018220
NewSky SecurityinNewSky SecurityCryptocurrency Mining Hacks: How Thefts Steal Bitcoin and EthereumCryptocurrency hacks are not limited in a single way. Dark web honeypots discovered attacks on mining hardware, software, and wallets…Apr 24, 20181Apr 24, 20181
NewSky SecurityinNewSky SecurityNewSky Security Co-Founder Accepted into Forbes Technology CouncilNewSky Security’s CTO and Co-Founder, Song Li, has been accepted into the Forbes Technology Council, an invitation-only community for…Apr 23, 20182Apr 23, 20182
NewSky SecurityinNewSky SecurityUnderstanding the IoT Hacker — A Conversation With Owari/Sora IoT Botnet AuthorAn IoT cybersecurity company security researcher gave an exclusive interview with an IoT hacker who created Owari and Sora botnets…Apr 13, 2018Apr 13, 2018
NewSky SecurityinNewSky Security“StartWallet”: How not to lose money while cryptominingMake sure that your mining machines are not working for others’ wallets.Mar 14, 2018Mar 14, 2018