Intrusion Prevention



This indicates detection of suspicious traffics that might belong to various malicious files related to IoT based devices.
The malicious software attempts to infect the device and abuse it for illegal purposes.

Affected Products

All Unix based operating systems


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Monitor the traffic from that network for any suspicious activity.
Use AntiVirus software to scan and clean the system.