article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. Starks Federal Communications Commission member Geoffrey Starks recently alluded to the possibility that China may have secretly coded the firmware in Huawei’s equipment to support cyber espionage and cyber infrastructure attacks. telecoms by Chinese tech giant Huawei.

Firmware 233
article thumbnail

New Bluetooth Vulnerability

Schneier on Security

When, say, an iPhone is getting ready to pair up with Bluetooth-powered device, CTKD’s role is to set up two separate authentication keys for that phone: one for a “Bluetooth Low Energy” device, and one for a device using what’s known as the “Basic Rate/Enhanced Data Rate” standard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Firmware Fuzzing 101

ForAllSecure

Netgear N300 MIPS firmware image. Binary Ninja (or other disassembler) and a strong knowledge of reverse engineering. What's Special about Firmware? Fuzzing firmware presents a specific set of challenges that are not often present together in other targets. Is a MIPS Linux firmware. Extracting Firmware.

article thumbnail

Firmware Fuzzing 101

ForAllSecure

Netgear N300 MIPS firmware image. Binary Ninja (or other disassembler) and a strong knowledge of reverse engineering. What's Special about Firmware? Fuzzing firmware presents a specific set of challenges that are not often present together in other targets. Is a MIPS Linux firmware. Extracting Firmware.

article thumbnail

Binarly released the free online scanner to detect the CVE-2024-3094 Backdoor

Security Affairs

Researchers from the firmware security firm Binarly released a free online scanner to detect the CVE-2024-3094 Backdoor Last week, Microsoft engineer Andres Freund discovered a backdoor issue in the latest versions of the “xz” tools and libraries. The malicious build interferes with the authentication in sshd through systemd.

Firmware 118
article thumbnail

PoC exploit for 2 flaws in Dahua cameras leaked online

Security Affairs

A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to immediately apply updates. “The identity authentication bypass vulnerability found in some Dahua products during the login process. Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

Researchers extract master encryption key from Siemens PLCs

CSO Magazine

Security researchers have found a way to extract a global encryption key that was hardcoded in the CPUs of several Siemens programmable logic controller (PLC) product lines, allowing them to compromise their secure communications and authentication.