article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. Starks Federal Communications Commission member Geoffrey Starks recently alluded to the possibility that China may have secretly coded the firmware in Huawei’s equipment to support cyber espionage and cyber infrastructure attacks. telecoms by Chinese tech giant Huawei.

Firmware 233
article thumbnail

Firmware attacks, a grey area in cybersecurity of organizations

Security Affairs

A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. The study pointed out that only 29% of the targeted organizations have allocated budgets to protect firmware. Firmware vulnerabilities are also exacerbated by a lack of awareness and a lack of automation.”

Firmware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘CosmicStrand’ Highlights Ongoing Firmware Risks

Security Boulevard

You’re not imagining things; new firmware threats are appearing more often. The most recent is CosmicStrand, which exploits the Unified Extensible Firmware Interface (UEFI) to avoid detection. The post ‘CosmicStrand’ Highlights Ongoing Firmware Risks appeared first on Security Boulevard.

article thumbnail

PTZOptics cameras zero-days actively exploited in the wild

Security Affairs

Affected devices use VHD PTZ camera firmware < 6.3.40 Attackers can also trigger flaws to extract network details to infiltrate connected systems, increasing the risk of data breaches and ransomware attacks. “Organizations using VHD PTZ camera firmware < 6.3.40 ” reads the analysis published by GreyNoise.

Firmware 119
article thumbnail

SonicWall warns of an exploitable SonicOS vulnerability

Security Affairs

” SonicWall is urging customers to upgrade the SonicOS firmware of their firewalls to patch an authentication bypass vulnerability tracked as CVE-2024-53704 (CVSS score of 8.2). The same firmware upgrade contains mitigations for additional, less-critical vulnerabilities.”

Firewall 112
article thumbnail

iPhone Malware that Operates Even When the Phone Is Turned Off

Schneier on Security

t turns out that the iPhone’s Bluetooth chip­ — which is key to making features like Find My work­ — has no mechanism for digitally signing or even encrypting the firmware it runs. The research is the first — or at least among the first — to study the risk posed by chips running in low-power mode.

Malware 321
article thumbnail

10 Behaviors That Will Reduce Your Risk Online

Daniel Miessler

What follows is a set of basic security hygiene steps that will significantly reduce your risk online. Keep your firmware and software updated. The more fringe the site, the higher the risk of bad things happening while you’re there. These are the diet and exercise of the computer safety world. Stay on reputable websites.

Risk 345