Cybersecurity

Espressif IoT devices susceptible to WiFi vulnerabilities can allow hijackers to crash devices connected to enterprise networks

Matheus Eduardo Garbelini a member of the ASSET (Automated Systems SEcuriTy) Research Group at the Singapore University of Technology and…

5 years ago

Over 47K Supermicro servers’ BMCs are prone to USBAnywhere, remote virtual media vulnerability

Update: On September 4, 2019, Supermicro released security updates to address vulnerabilities affecting the Baseboard Management Controller (BMC). Administrators can…

5 years ago

Retadup, malicious worm infecting 850k Windows machines, self-destructs in a joint effort by Avast and the French police

A malicious worm, Retadup, affected 850k Windows machines throughout Latin America. The objective of the Retadup worm is to obtain…

5 years ago

A year-old Webmin backdoor revealed at DEF CON 2019 allowed unauthenticated attackers to execute commands with root privileges on servers

Earlier this month, at DEF CON 2019, a Turkish security researcher, Özkan Mustafa Akkuş presented a zero-day remote code execution…

5 years ago

Cisco Talos researchers disclose eight vulnerabilities in Google’s Nest Cam IQ indoor camera

On Monday, August 19, the Cisco Talos research team disclosed eight security vulnerabilities in Google’s Nest Cam IQ, a high-end…

5 years ago

A security issue in the net/http library of the Go language affects all versions and all components of Kubernetes

On August 19, the Kubernetes Community disclosed that a security issue has been found in the net/http library of the…

5 years ago

Security researcher publicly releases second Steam zero-day after being banned from Valve’s bug bounty program

Updated with Valve’s response: Valve, in a statement on August 22, said that its HackerOne bug bounty program, should not…

5 years ago

GitHub now supports two-factor authentication with security keys using the WebAuthn API

Yesterday, GitHub announced that it now supports Web Authentication (WebAuthn) for security keys. In addition to time-based one-time password (TOTP)…

5 years ago

New Bluetooth vulnerability, KNOB attack can manipulate the data transferred between two paired devices

Recently, a group of researchers exposed a severe vulnerability called Key Negotiation Of Bluetooth (KNOB) that allows an attacker to…

5 years ago

Security flaws in Boeing 787 CIS/MS code can be misused by hackers, security researcher says at Black Hat 2019

At the Black Hat 2019 security conference in Las Vegas, Ruben Santamarta, an IOActive Principal Security Consultant in his presentation…

5 years ago