Defining events in IoT Security, from around the World
At least 13,000 compromised IoT devices were used to attack financial sector businesses by a Mirai variant to IoTroop botnet, aka Reaper. 80 percent of compromised MikroTik routers and 20% various IoT devices (i.e. Apache and IIS web servers, webcams, DVRs, TVs, and routers).
A set of vulnerabilities have been discovered in medical device software used for brain monitoring. These vulnerabilities allow remote code execution and also result in a denial of service attack. Note that these are the known vulnerabilities in the device. There is no information about platform, cloud, access, privacy protections, etc.
US hospitals have, by far, the largest number of IoT security vulnerabilities.
Challenges in Securing Connected Hospitals - TrendLabs Security Intelligence Blog
CERT has a vulnerability alert on the entire CAN protocol. This protocol is used by all the devices in a computer to talk to each other and control the brakes, engine, etc.