IoT security threats highlight the need for zero trust principles

The growth in cyber threats demonstrates cybercriminals persistence and ability to adapt to evolving conditions in launching IoT malware attacks. Additionally, research indicates that cybercriminals are targeting legacy vulnerabilities, with 34 of the 39 most popular IoT exploits specifically directed at vulnerabilities that have existed for over three years.

Source: Help Net Security

 


Date:

Categorie(s):

Tag(s):