Remove Blog Remove Firmware Remove Passwords
article thumbnail

PTZOptics cameras zero-days actively exploited in the wild

Security Affairs

Affected devices use VHD PTZ camera firmware < 6.3.40 is an inadequate authentication mechanisms that could allow an attacker to access sensitive information like usernames, MD5 password hashes, and configuration data. . “Organizations using VHD PTZ camera firmware < 6.3.40 CVE-2024-8957 (CVSS score of CVSS 7.2)

Firmware 121
article thumbnail

U.S. CISA adds PTZOptics camera bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

Affected devices use VHD PTZ camera firmware < 6.3.40 is an inadequate authentication mechanisms that could allow an attacker to access sensitive information like usernames, MD5 password hashes, and configuration data. Organizations using VHD PTZ camera firmware < 6.3.40 reads the analysis published by GreyNoise.

Firmware 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fully segregated networks? Your dual-homed devices might disagree

Pen Test Partners

In this blog post, I look at a recent OT / ICS engagement with a Critical National Infrastructure (CNI) client, which shows why dual-homed devices can be valuable targets for attackers. My colleague Andrew recently published a blog post on this topic , its worth a read. What is a dual-homed device?

article thumbnail

Unanswered Questions Loom Over Cyber Attacks on M&S, Co-op & Harrods

Jane Frankland

That’s what this blog is all about, In it, I’m examining the changing landscape of cyber threats, looking first at the M&S cyber attack. This practice is especially critical for operating systems, third-party applications, and firmware, where vulnerabilities can quickly become widely known and targeted.

article thumbnail

The Crypto Game of Lazarus APT: Investors vs. Zero-days

SecureList

While we respected Google’s request for a set disclosure period, on May 28, 2024, Microsoft published a blog post titled “Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks,” which partially revealed our findings. Is that really all this game has to offer?

article thumbnail

Navigating a Heightened Cyber Threat Landscape: Military Conflict Increases Attack Risks

Security Boulevard

Read the blog Frequently Asked Questions About Iranian Cyber Operations. Contextualize OT vulnerabilities: Understand the specific risks posed by vulnerabilities within your OT environment, taking into account firmware versions, proprietary research and the potential impact on operational continuity.

article thumbnail

Nastiest Malware 2024

Webroot

Throughout 2024, RedLine demonstrated its effectiveness by stealing over 170 million passwords in just a six-month period, highlighting its massive impact. The malware’s capabilities expanded to include stealing not only passwords but also credit card details, cryptocurrency wallets, and browser data.

Malware 117