Manage episode 520089190 series 3348167
Hello to all our Cyber Squirrels!
Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities.
From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and defenders cover hundreds of CVEs — from long-forgotten exploits to newly discovered zero-days.
The trio dives into:
- Why IoT devices remain a major attack vector for threat actors and botnets
- What kinds of vulnerabilities IoT Hunter detects (and how it’s not AI)
- The surprising persistence of outdated frameworks like Boa HTTPd
- Real-world examples of IoT exploitation — from ransomware via smart cameras to botnets made of toasters
- Practical steps anyone can take to secure home and small business devices
This episode uncovers the risks and realities behind our increasingly connected world — and how automation and community collaboration are helping defenders keep up.
Resources Mentioned:
https://community.emergingthreats.net/t/iot-hunter-public-release/3024
https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Stay ahead of emerging threats, and subscribe! Happy hunting!
Chapters
1. Welcome to Proofpoint Discarded (00:00:00)
2. What Is IoT Hunter? (00:01:07)
3. Automation, Not AI (00:02:30)
4. Defining IoT and Device Coverage (00:03:26)
5. Old and New Vulnerabilities (00:04:36)
6. Configurations vs. Exploits (00:06:28)
7. Why Open Source IoT Hunter? (00:07:47)
8. The Power of the Community (00:09:10)
9. Unexpected Vulnerabilities in Automation Devices (00:10:01)
10. Outdated Software in “New” Devices (00:13:15)
11. When Smart Devices Go Wrong (00:14:55)
12. Why IoT Devices Are Targeted (00:16:26)
13. From Toasters to Botnets (00:19:44)
14. Expanding Attack Surfaces (00:22:21)
15. Practical Protection Tips (00:23:38)
16. Sometimes Dumb Is Smart (00:27:23)
93 episodes