Podcast: Key Takeaways For DevOps in BSIMM9

From supply chain to orchestration tools, here are the new trends that DevOps should pay attention to in this year’s BSIMM report.

Link: https://threatpost.com/podcast-key-takeaways-for-devops-in-bsimm9/138168/

Naming & Shaming Web Polluters: Xiongmai

What do we do with a company that regularly pumps metric tons of virtual toxic sludge onto the Internet and yet refuses to clean up their act? If ever there were a technology giant that deserved to be named and shamed for polluting the Web, it is Xiongmai — a Chinese maker of electronic parts that power a huge percentage of cheap digital video recorders (DVRs) and Internet-connected security cameras.

Link: https://krebsonsecurity.com/2018/10/naming-shaming-web-polluters-xiongmai/

Pumping the Brakes on Artificial Intelligence

Businesses are increasingly adopting artificial intelligence, but all too often these platforms don’t feature security-by-design.

Link: https://threatpost.com/pumping-the-brakes-on-artificial-intelligence/137838/

Hide and Seek IoT Botnet Learns New Tricks: Uses ADB over Internet to Exploit Thousands of Android Devices

Hide and Seek, a new IoT botnet discovered by our honeypot system in early January, has quickly gained notoriety after amassing over 90,000 devices in a large botnet in a matter of days. While the first variant performed brute force attacks over the Telnet service to jack into devices, later updates involved new command injection […]

Link: https://labs.bitdefender.com/2018/09/hide-and-seek-iot-botnet-learns-new-tricks-uses-adb-over-internet-to-exploit-thousands-of-android-devices/