https://docs.aws.amazon.com/iot/latest/developerguide/reserved-topics.html
This would be especially nice for implementing:
Thing Shadows
Events
Jobs
Thing Shadows
Events
Jobs
We #didit too! After moving away from Twitter a while ago, we will make our videos from YouTube available soon on @MakerTube over at @riot_os! Hope to see you there! #did #iot #fediverse
Mi pareja compró un cacharro de estos de segunda mano y no supo hacerlo funcionar. Yo le dije que probablemente estuviese algo defectuoso y por ahí sigue aparcado. La razón es que no quería conectar a mi red algo de dudosa seguridad. Pero podría ser aún mucho peor que una cuestión de seguridad. ¡Lean, lean!
https://codetiger.github.io/blog/the-day-my-smart-vacuum-turned-against-me/
New, from me: The Kimwolf Botnet is Lurking in Corporate, Govt. Networks
A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.
https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/
New, from me: Who Operates the Badbox 2.0 Botnet?
The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.
https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/