-
Spotlight on Lablet Research #21 - Principles of Secure BootStrapping for IoTSpotlight on Lablet Research #21 - Principles of Secure BootStrapping for IoT
-
"Researchers Show How Censorship Systems Can Be Abused for DDoS Amplification"Researchers have identified a new Distributed Denial-of-Service (DDoS) attack vector over TCP that allows for reflected amplification at significantly high levels, previously unseen. Misconfigured network middleboxes and censorship systems, including…
-
"Data Leak Exposes Tens of Millions of Private Records From Corporations And Government Agencies"According to researchers at UpGuard, dozens of major companies, state and federal agencies, and other organizations that misconfigured a setting in their Microsoft software inadvertently exposed millions of people's personal information to the public…
-
"Cybercrime Losses Triple to £1.3bn in 1H 2021"Researchers at Outpost24 analyzed data that comes from the National Fraud Intelligence Bureau (NFIB). The NFIB collects cybercrime and fraud reports from Action Fraud, the UK’s national reporting center for such crimes. The researchers found…
-
"Security Flaws Found in Two Home Electric Car Chargers"Security flaws have been discovered in two different electric vehicle (EV) chargers, Wallbox and Project EV, which are both approved for sale in the UK. These EV chargers are Internet-enabled and can connect to smartphone apps. According to researchers…
-
"ProxyShell Attacks Escalate"The ProxyShell vulnerabilities in Microsoft Exchange remain a problem for enterprises as attackers have been increasing their scanning for and exploitation of the bugs. In some cases, they have been installing ransomware. Microsoft released…
-
"Hackers Could Increase Medication Doses Through Infusion Pump Flaws"Researchers have recently found that pacemakers, insulin pumps, mammography machines, ultrasounds, and monitors, contain worrying security vulnerabilities. The latest addition to that long lineup is a popular infusion pump and dock, the B. Braun…
-
"Time to Fix High Severity Apps Increases by Ten Days"Researchers at NTT Application Security found that the average time to fix high severity application security flaws has increased by ten days in just a month. Although it found the "time to fix" had dropped overall by two days, from 202 days to 200…
-
"Razer Bug Lets You Become a Windows 10 Admin by Plugging in a Mouse"A security researcher has disclosed a zero-day vulnerability in the device installer software for Razer peripherals. This vulnerability can allow a malicious actor to gain Windows administrator privileges just by plugging in a Razer mouse or…
-
"Cybersecurity Experts Worried by Chinese Firm’s Control of Smart Devices"Cyber experts warn that Chinese tech giant Tuya’s IOT products may be a high security risk. Tuya makes products that have been incorporated into many of today's, smart devices including smart TVs, smart home security camera, home thermostats and…
News