Remove 2024 Remove Architecture Remove Firmware
article thumbnail

New Mirai botnet targets TBK DVRs by exploiting CVE-2024-3721

Security Affairs

A new variant of the Mirai botnet exploits CVE-2024-3721 to target DVR systems, using a new infection method. Researchers from Russian cybersecurity firm Kaspersky discovered a new variant of the Mirai botnet that exploits a command injection vulnerability ( CVE-2024-3721 ) in TBK DVR-4104 and DVR-4216 digital video recording devices.

IoT 138
article thumbnail

U.S. CISA adds SonicWall SonicOS and Palo Alto PAN-OS flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

The two vulnerabilities are: CVE-2025-0108 Palo Alto PAN-OS Authentication Bypass Vulnerability CVE-2024-53704 SonicWall SonicOS SSLVPN Improper Authentication Vulnerability Researchers recently warned that threat actors exploit a recently disclosed vulnerability, CVE-2025-0108, in Palo Alto Networks PAN-OS firewalls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Modeling in Solar Power Infrastructure

SecureWorld News

Attackers with physical access can connect directly to service ports, extract firmware, install malicious hardware modifications, or replace communication modules with compromised versions. Use boot verification and firmware integrity checks to detect unauthorized modifications. Yes, you read that right.

Firmware 102
article thumbnail

Safer with Google: Advancing Memory Safety

Google Security

In Android, which runs on billions of devices and is one of our most critical platforms, we've already made strides in adopting MSLs, including Rust, in sections of our network, firmware and graphics stacks. ACM 67, 6 (June 2024), 52–60. The security architecture of the chromium browser." link] ↩ [link] ↩ Kern, C.

article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

Experts warn that organizations must act decisively to protect against this growing threat by implementing Zero Trust architectures, patching vulnerabilities, and strengthening identity security. Stolen credentials remain the top breach factor, responsible for 24% of incidents in 2024.

article thumbnail

Mercedes-Benz Head Unit security research report

SecureList

Their report is a good starting point for diving deep into the MBUX internals and understanding the architecture of the system. Full information on the MBUX architecture can be found in the KeenLab research. Firmware The MMB runs on Linux, and its filesystems are located on the eMMC. MBUX was previously analysed by KeenLab.

Backups 123
article thumbnail

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

SecureList

We recently observed the use of CVE-2024-3721 in attempts to deploy a bot in one of our honeypot services. Exploitation During a review of the logs in our Linux honeypot system, we noticed an unusual request line linked to a CVE-2024-3721. In this article, we describe the new Mirai bot features and its revamped infection vector.

Internet 126