. home.aspx



IoT Attacks Doubled in Two Months, Check Point Says

August 15, 2018 / Jessica Lyons Hardcastle

Malware targeting IoT vulnerabilities hit almost half of global organizations last month, with networking and IoT attacks more than doubling since May, according to Check Point’s monthly report. Each month Check Point publishes three Top 10 lists: Most Wanted Malware; Most Wanted Mobile Malware; and Most Exploited Vulnerabilities. The reports are based on data from Check Point’s ThreatCloud database, which analyzes more than 250 million addresses for bot discovery, more than 11 million malware signatures, and more than 5.5 million infected websites. It also identifies millions of malware types daily. In July, three IoT vulnerabilities entered the Top 10 Most Exploited Vulnerabilities list. They were: MVPower DVR router Remote Code Execution at No. 5; D_Link DSL-2750B router Remote Command Execution at No. 7; and Dasan GPON router Authentication Bypass at No. 10.