AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Detecting a Thread Actor Intruder in a Home Security System
The adversary also took the care to utilize compromise iot devices outside the victim environment. One of the first commanding control ip addresses we found turned out to be an innernet accessible video conferencig camera. We don't have any reason to believe that there's a supply chain like angle to this. For them to function as the attackers hot point or se to address, they need to be inaccessible - which they're not supposed to be by design.