Technology RCE exploit for Wyze Cam v3 publicly released, patch now Oct 30, 2023 bleepingcomputer.com A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and…
Technology Tesla infotainment jailbreak unlocks paid features, extracts secrets Aug 6, 2023 bleepingcomputer.com Researchers from the Technical University of Berlin have developed a method to hack the AMD-based infotainment systems used in all…
Technology Super Admin elevation bug puts 900,000 MikroTik devices at risk Jul 25, 2023 bleepingcomputer.com A critical severity 'Super Admin' privilege elevation flaw puts over 900,000 MikroTik RouterOS routers at risk, potentially enabling attackers to…
Technology Fake Linux vulnerability exploit drops data-stealing malware Jul 13, 2023 bleepingcomputer.com Cybersecurity researchers and threat actors are targeted by a fake proof of concept (PoC) CVE-2023-35829 exploit that installs a Linux…
Cyber Security Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years May 10, 2023 darkreading.com While Intel is still investigating the incident, the security industry is bracing itself for years of potential firmware insecurity if…
Technology Synology fixes maximum severity vulnerability in VPN routers Jan 3, 2023 bleepingcomputer.com Taiwan-based NAS maker Synology has addressed a maximum (10/10) severity vulnerability affecting routers configured to run as VPN servers. [...]
Technology New Syslogk Linux rootkit uses magic packets to trigger backdoor Jun 13, 2022 bleepingcomputer.com A new rootkit malware named 'Syslogk' has been spotted in the wild, and it features advanced process and file hiding…
Technology New Symbiote malware infects all running processes on Linux systems Jun 9, 2022 bleepingcomputer.com Threat analysts have discovered a new malware targeting Linux systems that operates as a symbiote in the host, blending perfectly…
Cyber Security Technology Severe Remote Code Execution Flaws Discovered in Motorola Halo+ Baby Monitors Sep 17, 2021 bmalandrone On Tuesday, Randy Westergren, a cybersecurity expert, published his study on the Motorola Halo+, a popular baby monitor. He revealed…
RCE exploit for Wyze Cam v3 publicly released, patch now
A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and…
Tesla infotainment jailbreak unlocks paid features, extracts secrets
Researchers from the Technical University of Berlin have developed a method to hack the AMD-based infotainment systems used in all…
Super Admin elevation bug puts 900,000 MikroTik devices at risk
A critical severity 'Super Admin' privilege elevation flaw puts over 900,000 MikroTik RouterOS routers at risk, potentially enabling attackers to…
Fake Linux vulnerability exploit drops data-stealing malware
Cybersecurity researchers and threat actors are targeted by a fake proof of concept (PoC) CVE-2023-35829 exploit that installs a Linux…
Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years
While Intel is still investigating the incident, the security industry is bracing itself for years of potential firmware insecurity if…
Synology fixes maximum severity vulnerability in VPN routers
Taiwan-based NAS maker Synology has addressed a maximum (10/10) severity vulnerability affecting routers configured to run as VPN servers. [...]
New Syslogk Linux rootkit uses magic packets to trigger backdoor
A new rootkit malware named 'Syslogk' has been spotted in the wild, and it features advanced process and file hiding…
New Symbiote malware infects all running processes on Linux systems
Threat analysts have discovered a new malware targeting Linux systems that operates as a symbiote in the host, blending perfectly…
Severe Remote Code Execution Flaws Discovered in Motorola Halo+ Baby Monitors
On Tuesday, Randy Westergren, a cybersecurity expert, published his study on the Motorola Halo+, a popular baby monitor. He revealed…