Artwork
iconShare
 
Manage episode 520089190 series 3348167
Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Send us fan mail!

Hello to all our Cyber Squirrels!

Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities.

From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and defenders cover hundreds of CVEs — from long-forgotten exploits to newly discovered zero-days.

The trio dives into:

  • Why IoT devices remain a major attack vector for threat actors and botnets

  • What kinds of vulnerabilities IoT Hunter detects (and how it’s not AI)

  • The surprising persistence of outdated frameworks like Boa HTTPd

  • Real-world examples of IoT exploitation — from ransomware via smart cameras to botnets made of toasters

  • Practical steps anyone can take to secure home and small business devices

This episode uncovers the risks and realities behind our increasingly connected world — and how automation and community collaboration are helping defenders keep up.

Resources Mentioned:

community.emergingthreats.net

https://community.emergingthreats.net/t/iot-hunter-public-release/3024

https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095

For more information about Proofpoint, check out our website.

Subscribe & Follow:

Stay ahead of emerging threats, and subscribe! Happy hunting!


  continue reading

Chapters

1. Welcome to Proofpoint Discarded (00:00:00)

2. What Is IoT Hunter? (00:01:07)

3. Automation, Not AI (00:02:30)

4. Defining IoT and Device Coverage (00:03:26)

5. Old and New Vulnerabilities (00:04:36)

6. Configurations vs. Exploits (00:06:28)

7. Why Open Source IoT Hunter? (00:07:47)

8. The Power of the Community (00:09:10)

9. Unexpected Vulnerabilities in Automation Devices (00:10:01)

10. Outdated Software in “New” Devices (00:13:15)

11. When Smart Devices Go Wrong (00:14:55)

12. Why IoT Devices Are Targeted (00:16:26)

13. From Toasters to Botnets (00:19:44)

14. Expanding Attack Surfaces (00:22:21)

15. Practical Protection Tips (00:23:38)

16. Sometimes Dumb Is Smart (00:27:23)

93 episodes