Remove Firmware Remove Malware Remove Mobile Remove Surveillance
article thumbnail

JekyllBot:5 flaws allow hacking TUG autonomous mobile robots in hospitals

Security Affairs

Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. A TUG is an autonomous mobile robot designed for hospitals by Aethon. Cynerio ethically disclosed the issues to Aethon and the vendor addressed it with the release of firmware updates.

Mobile 127
article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. The top malware strains in 2021 included remote access Trojans (RATs), banking Trojans, information stealers, and ransomware.

Malware 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

June 2023 Security Update for Android fixed Arm Mali GPU bug used by spyware?

Security Affairs

June 2023 security update for Android released by Google fixes about fifty flaws, including an Arm Mali GPU bug exploited by surveillance firms in their spyware. The flaw made headlines because it was exploited by surveillance firms for their spyware. This vulnerability grants the attacker system access.

Spyware 83
article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 1988 with prefix CN8FF, deeply passionate about RF measurement, antennas, satellites, Software-defined radio, Digital Mobile Radio and RF Pentesting. Malware Propagation: RF signals can carry malware or by OTA upgrade.

article thumbnail

Zero-Click Attacks a Growing Threat

eSecurity Planet

Most attacks make would-be victims click to install malware or redirect them to a phishing page to steal their credentials. It can even access the chip’s firmware to gain root access on the device, a significant privilege escalation. Zero-click attacks remove this hurdle.

Spyware 114
article thumbnail

IT threat evolution Q3 2021

SecureList

Mobile statistics. The PyInstaller module for Windows contains a script named “Guard” Interestingly, this malware was developed for both Windows and macOS operating systems. The malware tries to spread to other hosts on the network by infecting USB drives. IT threat evolution Q3 2021. IT threat evolution in Q3 2021.

Malware 87
article thumbnail

APT annual review 2021

SecureList

Based on forensic analysis of numerous mobile devices, Amnesty International’s Security Lab found that the software was repeatedly used in an abusive manner for surveillance. Based on our observations, this is further complicated by the deployment of non-persistent malware, which leaves almost no traces after reboot.

Malware 102