• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices

You are here: Home / Cyber Security News / IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices

IoT equipment from online video conferencing techniques to IP cameras are amid the 5 riskiest IoT equipment connected to networks, in accordance to investigation highlighted by Forescout’s cybersecurity research arm, Vedere Labs.

The company identified recurring themes in their recent investigation, highlighting the growing attack surface due to far more equipment remaining linked to organization networks, and how risk actors are able to leverage these devices to reach their goals.

“IP cameras, VoIP and video-conferencing devices are the riskiest IoT gadgets simply because they are normally uncovered on the internet, and there is a very long background of menace actor exercise concentrating on them,” The Forescout report said.

The attack surface area now encompasses IT, IoT and OT in almost each and every organization, with the addition of IoMT in healthcare. Businesses need to be conscious of risky devices across all types. Forescout suggests that automated controls are put into action and that companies do not rely on siloed security in the IT network, OT network or for specific styles of IoT units.

This latest exploration delivers an update to the company’s results from 2020 in which networking products, VoIP, IP cameras and programmable logic controllers (PLCs) were being listed and remain among the riskiest devices across IT, IoT, OT and IoMT in 2022.

Even so, new entries this kind of as hypervisors and human equipment interfaces (HMIs) are representative of traits which includes critical vulnerabilities and amplified OT connectivity.

Vedere Labs analyzed machine facts involving January 1 and April 30 in Forescout’s Machine Cloud. The anonymized knowledge will come from Forescout customer deployments and includes information and facts about nearly 19 million gadgets – a variety that grows daily, in accordance to the company.

The in general risk of a device was calculated based on a few things: configuration, perform and conduct.

Just after measuring the risk of just about every personal product, Vedered Labs calculated averages per system variety to realize which are the riskiest.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Budworm Hackers Resurface with New Espionage Attacks Aimed at U.S. Organization
Next Post: Does the OWASP Top 10 Still Matter? »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.