article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

Passwordless Authentication without Secrets! This highlights an increasing demand for advanced authentication methods like passkeys and multi-factor authentication (MFA), which provide robust security for most use cases. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency.

article thumbnail

PTZOptics cameras zero-days actively exploited in the wild

Security Affairs

GreyNoise worked with VulnCheck to disclose the two vulnerabilities responsibly. “The vulnerabilities impact NDI-enabled pan-tilt-zoom (PTZ) cameras from multiple manufacturers. VulnCheck alerted affected manufacturers to the flaws, only receiving a response from PTZOptics. ” reads the analysis published by GreyNoise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

XE Group shifts from credit card skimming to exploiting zero-days

Security Affairs

. “XE Group transitioned from credit card skimming to targeted information theft, marking a significant shift in their operational priorities.Their attacks now target supply chains in the manufacturing and distribution sectors, leveraging new vulnerabilities and advanced tactics.” ” reads the analysis published by Intezer.

article thumbnail

Top 10 Cybersecurity Trends to Expect in 2025

Hacker's King

Companies will adopt stricter identity verification and access controls, ensuring that even internal users face rigorous authentication processes. Expect an increase in regulations requiring manufacturers to implement stronger security features in devices, alongside enhanced monitoring of IoT networks.

article thumbnail

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

The Last Watchdog

Every device, every connection, every interaction must be verified, authenticated, and monitored. And in manufacturing plants, theyre increasingly found in industrial control systems and autonomous robotics. The chipmakers, software developers and device manufacturers all have a role to play.

article thumbnail

BootKitty Linux UEFI bootkit spotted exploiting LogoFAIL flaws

Security Affairs

The bootkit hooks UEFI authentication functions to bypass the Secure Boot mechanism and patches GRUB boot loader functions to evade additional integrity verifications. Bootkitty supports a limited number of systems due to hardcoded byte patterns for function modification and fixed offsets for patching decompressed Linux kernels.

article thumbnail

U.S. CISA adds PTZOptics camera bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

The vulnerabilities impact NDI-enabled pan-tilt-zoom (PTZ) cameras from multiple manufacturers. is an inadequate authentication mechanisms that could allow an attacker to access sensitive information like usernames, MD5 password hashes, and configuration data. The manufacturer released firmware updates addressing these flaws.”