article thumbnail

Samsung zero-day flaw actively exploited in the wild

Security Affairs

Google researchers reported that the vulnerability explained that the issue resides in a driver that provides hardware acceleration for media functions like JPEG decoding and image scaling. Then the exploit code uses a specific firmware command to copy data, potentially overwriting a page middle directory (PMD) entry in a page table.

Firmware 144
article thumbnail

China-linked APT BlackTech was spotted hiding in Cisco router firmware

Security Affairs

US and Japanese authorities warn that a China-linked APT BlackTech planted backdoor in Cisco router firmware to hack the businesses in both countries. The group targeted organizations in multiple sectors, including defense, government, electronics, telecommunication, technology, media, telecommunication industries.

Firmware 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synology fixed critical flaw impacting millions of DiskStation and BeePhotos NAS devices

Security Affairs

However, since the vulnerability has a high potential for criminal abuse, and millions of devices are affected, a media reach-out was made to inform system owners of the issue and to stress the point that immediate mitigative actions are required.” Official guidance from Synology can be found on their advisories page.

Firmware 123
article thumbnail

SonicWall issues firmware patch after attackers exploited critical bugs

SC Magazine

x firmware. x firmware, which malicious actors exploited in a cyberattack against the infosec firm last month. . SonicWall’s firmware update to version 10.2.0.5-29sv The post SonicWall issues firmware patch after attackers exploited critical bugs appeared first on SC Media. SonicWall). 31 and Feb.

article thumbnail

Quantum Threats and How to Protect Your Data

SecureWorld News

Despite media hype suggesting potential for "cracking military-grade encryption," experts clarify that these achievements neither target nor compromise robust methods like AES, TLS, or other military-grade algorithms. Quantum computing brings both opportunities for advancement and significant security challenges.

article thumbnail

Microsoft acquires firmware analysis company ReFirm, eying edge IoT security

SC Magazine

ReFirm provides drag-and-drop automated firmware analysis, which Microsoft hopes will provide security insight for industrial IoT products, where security personnel often struggle to look inside built-in hardware. “Firmware is kind of the software that we politely ignore today,” he said.

article thumbnail

Hard drives containing sensitive medical data found in flea market

Malwarebytes

Under Dutch law, storage media with medical data must be professionally erased with certification. Some modern drives come with a secure erase command embedded in the firmware, but you need special software to execute the command, and it may require several rounds of overwrite.

Marketing 106