Cybercrime
A threat actor tracked as Water Barghest has compromised over 20,000 IoT devices and monetizes them as residential proxies.
Hi, what are you looking for?
The new attack technique uses smartwatches to capture ultrasonic covert communication in air-gapped environments and exfiltrate data.
A threat actor tracked as Water Barghest has compromised over 20,000 IoT devices and monetizes them as residential proxies.
D-Link warns of a critical-severity command injection vulnerability impacting multiple discontinued NAS models.
ZDI discloses vulnerabilities in the infotainment system of multiple Mazda car models that could lead to code execution.
Door access controllers remain vulnerable to remote hacker attacks for extended periods of time, a researcher has found.
Security researchers detail vulnerabilities in Kia owners’ portal that allowed them to control vehicles remotely.
A researcher analyzing building access control vulnerabilities says a US healthcare facility has yet to patch security holes one year after being notified.
In extreme situations, a foreign adversary could shut down or take simultaneous control of multiple vehicles operating in the United States, causing crashes and...
Doctor Web warns of the new Vo1d Android malware infecting roughly 1.3 million TV boxes running older OS versions.
A significant backdoor in contactless cards made by China-based Shanghai Fudan Microelectronics allows instantaneous cloning of RFID cards used to open office doors and...
Sonos has patched vulnerabilities in its smart speakers, including a serious flaw that could have been exploited to eavesdrop on users.
Vulnerabilities found in solar power systems could have been exploited by hackers to cause disruption and possibly blackouts.
A recently patched Vision Pro vulnerability was classified by Apple as a DoS issue, but a researcher has shown that it’s ‘scary’.
Apple has released a visionOS update that patches CVE-2024-27812, which may be the first flaw specific to the VR headset.
Forescout's 2024 analysis of the riskiest devices highlights vulnerabilities and threat actor interactions across IT, IoT, OT, and IoMT.
Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards.
MITRE announced the public availability of the EMB3D threat model for embedded devices used in critical infrastructure.
As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.
Second identifier, CVE-2024-3272, assigned to unpatched D-Link NAS device vulnerabilities, just as exploitation attempts soar.
Many LG TVs may be vulnerable to remote hacking due to a series of vulnerabilities found by Bitdefender researchers.
Unpatched D-Link NAS device vulnerability CVE-2024-3273, potentially affecting many devices, is being exploited in the wild.