The UK government has proposed a new Product Security and Telecommunications Infrastructure (PSTI) Bill to protect users against security issues prevalent in Internet of Things (IoT) devices. The bill places security requirements on IoT device manufacturers, importers, and distributors, including rapid vulnerability disclosure and a ban on default passwords. To remain competitive in a world of high-speed technological change, many manufacturers release IoT devices that have unaddressed vulnerabilities. Although this bill is intended to eradicate such practices, it will be difficult for the UK to enforce, and is unlikely to have a significant impact in the following 12 months. For the legislation to see real success, consumer education and responsibility must also improve.

Threat Intel Fan?
Sign up below to get our TI updates delivered to your inbox!
Other content in this Stream

Advanced persistent threat (APT) groups are often tricky to wrap your head around. By their nature, state-associated groups are well-resourced ...

It has been five years since the dumpster fire we all remember as WannaCry. WannaCry is self-propagating ransomware that held ...

ShadowTalk host Chris alongside Ivan and Nicole bring you the latest in threat intelligence. This week they cover: * REvil ransomware returns with new malware * Moshen Dragon targeting...

In late 2021, we observed a new ransomware operation named “ALPHV” (also known as BlackCat) emerge. The group operates as ...

For the first half of 2021, ransomware groups looked unstoppable. Ransomware gangs were adding victim after victim on their dark ...

The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its ...

As a threat intelligence professional, it’s difficult to ignore how major developments in the real world affect the lives of ...

This blog is the second part of our Data Analysis in Threat Intelligence series, where we focus on the tools ...

As an intelligence analyst, it’s paramount to stay on top of what’s happening in the world around you. To inform ...

You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...

ShadowTalk host Stefano alongside Rory bring you the latest in threat intelligence. This week they cover: * 'RaidForums' has been shut down and seized * SandWorm targets electrical substations in...

In the first quarter of 2022, several high-severity vulnerabilities were targeted by threat actors to facilitate malicious campaigns. The first ...

As the new year has reached the end of its first quarter, it’s time for us to go back and ...

It’s been a little over a month since I wrote about how intelligence requirements (IRs) can help plan a cyber ...

In the past few weeks, the Lapsus$ threat group captured the security community’s attention with a series of brazen and ...

At the end of February, the cybersecurity community was rocked by the appearance of alleged chat logs recording conversations between ...

ShadowTalk host Stefano alongside Chris and Rick bring you the latest on structured analytical techniques. This episode they cover: *Why they use SATs in their intel team *How they came up with...

ShadowTalk host Stefano alongside Kim, Xue, and Rick bring you the latest in threat intelligence. This week they cover: * A recap of a highly dynamic quarter including: * Log4j complex mitigation...

In 2020, there was an estimated 59 trillion gigabytes of data in the world. Most of which was created in ...

Since Russia’s invasion of Ukraine in February, the Digital Shadows Photon team has been following multiple aspects of the tragic ...