ENTERPRISE IOT, INFRASTRUCTURE

EyeSpy - Iranian Spyware Delivered in VPN Installers

August 16, 2022

eyespy-iranian-spyware
During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Spotlight

Proxim Wireless

Home Proxim Wireless Proxim Wireless provides Point-to-Point Point-to-Multipoint and WLAN solutions for wireless internet, video surveillance and backhaul applications. Our ORiNOCO® and Tsunami® product lines are sold to service providers and enterprises with over 2 million devices shipped to more than 250,000 customers in over 90 countries worldwide. For more information, visit www.proxim.com.

OTHER WHITEPAPERS
news image

4 Keys to Managing IT Remotely

whitePaper | January 12, 2022

The advantages of a well-designed remote IT management solution become indispensable once it enables MSPs and IT departments to do all of the following remotely: Run and maintain IT infrastructure to significantly reduce the average ticket response time Perform maintenance tasks during off hours to avoid interrupting employees Be proactive instead of reactive by keeping software current and safe from cyberattacks, with endpoints protected and data backed up Gain real-time insights into IT infrastructure and share them with business stakeholders to help evaluate current conditions, make timely decisions, and project future needs Boost operational efficiency and reduce costs by monitoring devices and addressing potential problems before they become major issues

Read More
news image

The Work Ahead in IoT: The Gap Widens Between IoT ‘Haves’ and ‘Have-nots’

whitePaper | September 1, 2021

The current task with IoT is to drive performance outcomes by combining it with other advanced technologies and gaining buy-in from the employees essential to making digital initiatives possible. While the definition of IoT evolves, the mission remains essentially the same: to provide real-time visibility into critical business operations.

Read More
news image

Securing the Internet of Things Supply Chain

whitePaper | May 17, 2022

The Internet of Things Security Foundation (IoTSF) is a non-profit, global membership organisation. Established in 2015, we are an international response to the complex challenges posed by cybersecurity in the expansive hyper-connected IoT world.

Read More
news image

Bust the Top Myth of 5G Adoption to Lead the Evolution of the Internet of Things

whitePaper | December 19, 2019

As the world awaits the premiere of 5G, excitement about the future of the Internet of Things (IoT) is growing. Smart cities, mobile health, smart utilities, and connected buildings – these are just some of the life-changing applications that are highly anticipated. But do you really have to wait until 5G is ready to deliver these capabilities?

Read More
news image

INTERNET OF THINGS AND UEI DATA ACQUISITION & CONTROL SYSTEMS

whitePaper | February 5, 2020

The Internet of Things (IoT) is a networked system of interconnected physical objects that have the capability of sharing data with each other and also with a cloud service for archiving and analysis. With IoT, data producing devices can easily publish data, and multiple consumer clients can receive that data from any location in the world.

Read More
news image

Rubrik Security Cloud Architecture and Security Implementation

whitePaper | February 22, 2023

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Spotlight

Proxim Wireless

Home Proxim Wireless Proxim Wireless provides Point-to-Point Point-to-Multipoint and WLAN solutions for wireless internet, video surveillance and backhaul applications. Our ORiNOCO® and Tsunami® product lines are sold to service providers and enterprises with over 2 million devices shipped to more than 250,000 customers in over 90 countries worldwide. For more information, visit www.proxim.com.

Events