I am rather surprised I haven't seen an AWS IoT alternative that sits on top of something like NATS. I feel like this could be low hanging fruit to write a service that does most of the things AWS IoT does by pub/sub-ing to all the $aws/* reserved topics and implementing them with NATS as the MQTT broker.<br><br><a href="https://docs.aws.amazon.com/iot/latest/developerguide/reserved-topics.html" rel="nofollow" class="ellipsis" title="docs.aws.amazon.com/iot/latest/developerguide/reserved-topics.html"><span class="invisible">https://</span><span class="ellipsis">docs.aws.amazon.com/iot/latest</span><span class="invisible">/developerguide/reserved-topics.html</span></a><br><br>This would be especially nice for implementing:<br><br><p>Thing Shadows<br>Events<br>Jobs</p><a href="/tags/iot/" rel="tag">#IoT</a> <a href="/tags/aws/" rel="tag">#AWS</a> <a href="/tags/nats/" rel="tag">#NATS</a><br>
iot
<p>The internet of things is truly a wonder. 😝 </p><p><a href="/tags/dishwasher/" rel="tag">#dishwasher</a> <a href="/tags/parody/" rel="tag">#parody</a> <a href="/tags/iot/" rel="tag">#iot</a></p>
<p>We <a href="/tags/didit/" rel="tag">#didit</a> too! After moving away from Twitter a while ago, we will make our videos from YouTube available soon on <span class="h-card"><a href="https://mastodon.social/@MakerTube" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>MakerTube</span></a></span> over at <span class="h-card"><a href="[{'type': 'Link', 'href': 'https://makertube.net/c/riot_os/videos', 'mediaType': 'text/html'}, {'type': 'Link', 'href': 'https://makertube.net/c/riot_os', 'mediaType': 'text/html'}, {'type': 'Link', 'href': 'https://makertube.net/video-channels/riot_os', 'mediaType': 'text/html'}]" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>riot_os</span></a></span>! Hope to see you there! <a href="/tags/did/" rel="tag">#did</a> <a href="/tags/iot/" rel="tag">#iot</a> <a href="/tags/fediverse/" rel="tag">#fediverse</a></p>
<p>Mi pareja compró un cacharro de estos de segunda mano y no supo hacerlo funcionar. Yo le dije que probablemente estuviese algo defectuoso y por ahí sigue aparcado. La razón es que no quería conectar a mi red algo de dudosa seguridad. Pero podría ser aún mucho peor que una cuestión de seguridad. ¡Lean, lean!</p><p><a href="https://codetiger.github.io/blog/the-day-my-smart-vacuum-turned-against-me/" rel="nofollow" class="ellipsis" title="codetiger.github.io/blog/the-day-my-smart-vacuum-turned-against-me/"><span class="invisible">https://</span><span class="ellipsis">codetiger.github.io/blog/the-d</span><span class="invisible">ay-my-smart-vacuum-turned-against-me/</span></a></p><p><a href="/tags/privacidad/" rel="tag">#Privacidad</a> <a href="/tags/privacy/" rel="tag">#Privacy</a> <a href="/tags/iot/" rel="tag">#IOT</a></p>
I had a shower thought about using NATS to offer an AWS IoT alternative that would implement the same device shadow topics to make migration easier, but also offer a way to make provisioning new devices much less complicated than to get further into bed with AWS products.<br><br><a href="/tags/nats/" rel="tag">#NATS</a> <a href="/tags/iot/" rel="tag">#IoT</a> <a href="/tags/golang/" rel="tag">#GoLang</a><br>
<p>New, from me: The Kimwolf Botnet is Lurking in Corporate, Govt. Networks</p><p>A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.</p><p><a href="https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/" rel="nofollow" class="ellipsis" title="krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2026/01/ki</span><span class="invisible">mwolf-botnet-lurking-in-corporate-govt-networks/</span></a></p><p><a href="/tags/botnet/" rel="tag">#botnet</a> <a href="/tags/infosec/" rel="tag">#infosec</a> <a href="/tags/iot/" rel="tag">#IoT</a> <a href="/tags/ddos/" rel="tag">#DDoS</a> <a href="/tags/threatresearch/" rel="tag">#threatresearch</a> <a href="/tags/malware/" rel="tag">#malware</a></p>
Edited 75d ago
<p>New, from me: Who Operates the Badbox 2.0 Botnet?</p><p>The cybercriminals in control of Kimwolf -- a disruptive botnet that has infected more than 2 million devices -- recently shared a screenshot indicating they'd compromised the control panel for Badbox 2.0, a vast China-based botnet powered by malicious software that comes pre-installed on many Android TV streaming boxes. Both the FBI and Google say they are hunting for the people behind Badbox 2.0, and thanks to bragging by the Kimwolf botmasters we may now have a much clearer idea about that.</p><p><a href="https://krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/" rel="nofollow" class="ellipsis" title="krebsonsecurity.com/2026/01/who-operates-the-badbox-2-0-botnet/"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2026/01/wh</span><span class="invisible">o-operates-the-badbox-2-0-botnet/</span></a></p><p><a href="/tags/infosec/" rel="tag">#infosec</a> <a href="/tags/botnet/" rel="tag">#botnet</a> <a href="/tags/iot/" rel="tag">#IoT</a> <a href="/tags/android/" rel="tag">#Android</a> <a href="/tags/google/" rel="tag">#Google</a> <a href="/tags/threatresearch/" rel="tag">#threatresearch</a></p>
Edited 69d ago