The weaponization of IoT devices

Threat actors use botnets—networks of infected computers—for various cybercriminal purposes, most significantly distributed denial of service attacks against predefined targets. Today, botnets with distributed denial of services (DDoS) capabilities are even for sale on the Dark Web.

How has this threat evolved? One of the most important changes, the rising use of compromised Internet of Things devices in botnet operations, is the focus of this report.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

IBM logo
Provided by:
IBM
Topic:
Security
Format:
HTML