This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked. While it may be convenient that does not make it secure. While the companies will go and fix the issue once it has been found, it is typically found after someone has or has attempted to exploit it. In March 2021 attackers used recognized administrative credentials found online to hack into Verkada. Verkada is a video surveillance system that is cloud-based. This led to private information and video surveillance cameras being accessed. The private companies used by Verkada ranged from factories, hospitals, schools, etc. When it was found, over 100 employee accounts had been upgraded to a “super user/admin” privilege. Threats or attacks are not always announced so determining a true number can prove difficult.
Resources:
Munro, K. (n.d.). Internet of things security [Video]. TED Talks. https://www.ted.com/talks/ken_munro_internet_of_things_security
Uberoi, A. (n.d.). IoT Security: 5 cyber-attacks caused by IoT security vulnerabilities. https://www.cm-alliance.com/cybersecurity-blog/iot-security-5-cyber-attacks-caused-by-iot-security-vulnerabilities