article thumbnail

JekyllBot:5 flaws allow hacking TUG autonomous mobile robots in hospitals

Security Affairs

Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. A TUG is an autonomous mobile robot designed for hospitals by Aethon. Cynerio ethically disclosed the issues to Aethon and the vendor addressed it with the release of firmware updates.

Mobile 138
article thumbnail

Vulnerability makes hackers hijack video streams from millions of connected cameras

CyberSecurity Insiders

Security researchers say that the flaw is related to software component used in cloud surveillance platform ThroughTek that is used by OEMs while manufacturing IP Cameras, baby monitoring cams and pet monitoring solutions along with robotic and battery devices. score to the newly discovered P2P SDK vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

June 2023 Security Update for Android fixed Arm Mali GPU bug used by spyware?

Security Affairs

June 2023 security update for Android released by Google fixes about fifty flaws, including an Arm Mali GPU bug exploited by surveillance firms in their spyware. The flaw made headlines because it was exploited by surveillance firms for their spyware. This vulnerability grants the attacker system access.

Spyware 93
article thumbnail

HID Mercury Access Controller flaws could allow to unlock Doors

Security Affairs

access control, video surveillance and mobile credentialing) owned by HVAC giant Carrier. Below is the list of flaws discovered by the researchers: CVE Detail Summary Mercury Firmware Version CVSS Score CVE-2022-31479 Unauthenticated command injection <=1.291 Base 9.0, The vulnerabilities were disclosed during the Hardwear.io

article thumbnail

"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme

Pen Test

About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 1988 with prefix CN8FF, deeply passionate about RF measurement, antennas, satellites, Software-defined radio, Digital Mobile Radio and RF Pentesting. Criminals may use hijacked drones for illegal surveillance, smuggling, or even as weapons.

article thumbnail

Zero-Click Attacks a Growing Threat

eSecurity Planet

It can even access the chip’s firmware to gain root access on the device, a significant privilege escalation. The Amnesty International Security Lab created a special toolkit called MVT (Mobile Verification Toolkit) to inspect mobile devices and spot Pegasus.

Spyware 108
article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. Remcos, short for Remote Control and Surveillance, was leveraged by malicious cyber actors conducting mass phishing campaigns during the COVID-19 pandemic to steal personal data and credentials.

Malware 79