Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

DISCARDED: Tales From the Threat Research Trenches

From Toasters to Botnets: Securing Everyday IoT

18 Nov 2025

Description

Send us fan mail!Hello to all our Cyber Squirrels!Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities.From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and defenders cover hundreds of CVEs — from long-forgotten exploits to newly discovered zero-days.The trio dives into:Why IoT devices remain a major attack vector for threat actors and botnetsWhat kinds of vulnerabilities IoT Hunter detects (and how it’s not AI)The surprising persistence of outdated frameworks like Boa HTTPdReal-world examples of IoT exploitation — from ransomware via smart cameras to botnets made of toastersPractical steps anyone can take to secure home and small business devicesThis episode uncovers the risks and realities behind our increasingly connected world — and how automation and community collaboration are helping defenders keep up.Resources Mentioned:community.emergingthreats.nethttps://community.emergingthreats.net/t/iot-hunter-public-release/3024https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095For more information about Proofpoint, check out our website. Subscribe & Follow:Stay ahead of emerging threats, and subscribe! Happy hunting!

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.