article thumbnail

PTZOptics cameras zero-days actively exploited in the wild

Security Affairs

The company discovered the zero-day vulnerabilities in IoT live-streaming cameras, used in industrial operations, healthcare, and other sensitive environments. “Read the GreyNoise Labs blog for technical analysis and deeper insight into how Sift helped discover these zero-day vulnerabilities.”

Firmware 122
article thumbnail

Smart Home Data Breach Exposes 2.7 Billion Records

ZoneAlarm

Mars Hydro, a Chinese company that makes IoT devices like LED lights and hydroponics equipment, recently suffered a massive data breach, exposing approximately 2.7 Billion Records appeared first on ZoneAlarm Security Blog. Billion Records appeared first on ZoneAlarm Security Blog. billion records.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

And get the latest on open source software security; cyber scams; and IoT security. In the guidance, we describe the key steps in such a transition, and illustrate some of the cryptography and PQC-specific elements required at each stage of the programme, reads a companion blog.

Risk 69
article thumbnail

Top Cybersecurity Trends to Watch Out For in 2025

Centraleyes

Cyber-Physical System (CPS) Security As manufacturing, healthcare, and transportation industries become more digitized, the integration of cyber-physical systemslike smart grids, industrial control systems, and IoT devicesis growing. In 2025, securing these cyber-physical systems will be crucial for preventing major disruptions.

article thumbnail

Anomaly Detection for Cybersecurity

Security Boulevard

The Stratosphere use case where the DNN performed least well is a very specific IoT dataset. In these blogs we are trying to explain how the state of the art in incident detection is changing. It appears that the DNN had not been exposed to this sort of data in its training.

article thumbnail

4 Most Common Network Attacks and How to Thwart Them

SecureWorld News

The increasing use of cloud networks, IoT devices, and remote work policies make network environments more complex than ever, turning them into a high-risk asset for every organization. Cybercriminals are always looking for the easy way in, and the sheer complexity of modern infrastructures gives them exactly that.

DDOS 73
article thumbnail

Critical RCE in MCP Inspector Exposes AI Devs to Web-Based Exploits (CVE-2025-49596)

Penetration Testing

Oligo issues an example: imagine reading a tutorial or blog post that secretly contains JavaScript designed to ping [link] and before you know it, your machine is compromised. This is made possible by a 19-year-old vulnerability in browsers known as the “0.0.0.0-day”, day”, which allows websites to communicate with localhost services. “