article thumbnail

CVE-2023-3454: Critical Vulnerability in Brocade Fabric OS Exposes Networks to Remote Attacks

Penetration Testing

A serious vulnerability has been uncovered in Brocade Fabric OS, the firmware used by popular Fibre Channel switches found in numerous enterprise data centers.

article thumbnail

Urgent Firmware Alert: NVIDIA Tackles Critical DGX A100/H100 Flaws

Penetration Testing

Recently, NVIDIA has released a crucial firmware security update for its advanced computing systems, the DGX A100 and H100.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Vulnerabilities Found in Popular Smart Locks

Penetration Testing

Kontrol and Elock locks, both utilizing firmware from the company Sciener, have been found riddled with... The post Critical Vulnerabilities Found in Popular Smart Locks appeared first on Penetration Testing.

article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

Critical Start today released its biannual Cyber Intelligence Report, featuring the top threats observed in the first half of 2023 and emerging cybersecurity trends impacting the healthcare, financial services, and state and local government industries. After a brief hiatus, Emotet threat actors resumed their operations in early March 2023.

article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Teslas Get the Spotlight in Recent Ethical Hacking Efforts Researchers have discovered multiple vulnerabilities within Teslas since March 2023. Rapid7’s Zero Day Initiative hosts an event called Pwn2Own, and at the 2023 event, computer security firm Synactiv hacked a Tesla computer within two minutes.

Hacking 125
article thumbnail

Patch Management vs Vulnerability Management: What’s the Difference?

eSecurity Planet

Third-party vendor systems include Operating Systems (OS), firmware (software installed on hardware), and applications. Vulnerability management uses periodic, proactive testing to locate new vulnerabilities and continuously tracks older vulnerabilities. and installed software (browsers, accounting software, etc.),

article thumbnail

Canada revisits decision to ban Flipper Zero

Malwarebytes

The Flipper Zero is a portable device that can be used in penetration testing with a focus on wireless devices and access control systems. Flipper Zero made headlines in October because versions running third-party firmware could be used to crash iPhones running iOS 17 (since resolved in iOS 17.2).