IOT
Modern Strategies for IoT Device Fingerprinting
The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management ...
Security Boulevard
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril
Richi Jennings | | Anti-Terrorism, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child sexual exploitation, childpornography, Counter-Terrorism, counterterrorism, CSAM, Data encryption, E2EE, encryption, end-to-end encryption, extremism, france, ICS, ICS/SCADA systems, Pavel Durov, Privacy, Russia, SB Blogwatch, Telegram, Telegram app, Terrorgram, Terrorism, terrorist, terrorist attack, Terrorist attacks
Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize ...
Security Boulevard
Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION
KP♡TX PII: “General Motors has engaged in egregious business practices that violated Texans’ privacy … in unthinkable ways,” rants state attorney general Ken Paxton (pictured) ...
Security Boulevard
Why SMB Security Needs Efficient Device Management
SMBs are increasingly becoming the cyberattacker’s goldmine. Device management is one way to stay ahead of malicious actors and protect your crown data jewels ...
Security Boulevard
‘Blast-RADIUS’ Critical Bug Blows Up IT Vacation Plans
Richi Jennings | | blast radius, collision-based-hashing-algorithm-disclosure, CVE-2024-3596, hash, hash algorithms, hash function, hash functions, Man In The Middle, man in the middle attack, man in the middle attacks, maninthemiddleattacks, md5 hash, men-in-the-middle attack, mitm, MitM Attack, mitm attacks, RADIUS, SB Blogwatch
MD5 MITM Muddle: Ancient, widely used protocol has CVSS 9.0 vulnerability ...
Security Boulevard
Biggest Ever Password Leak — but is ObamaCare’s RockYou2024 Really NEW?
Richi Jennings | | credentials, Cybersecurity, Malware, ObamaCare, Passkeys, passwords, rockyou2021, RockYou2024, SB Blogwatch
Credential crunch: Ten billion plain-text passwords in a file—sky falling or situation normal? ...
Security Boulevard
‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE
Richi Jennings | | App Sec & Supply Chain Security, Apple, Apple iOS, AppSec & Supply Chain Security, CocoaPods, CVE-2024-38366, CVE-2024-38368, dependencies, dependency injection, Dependency Management, macos, macOS Security, Modern Software Supply Chains, Open Source and Software Supply Chain Risks, open source software supply chain, open source software supply chain security, SB Blogwatch, software dependencies, Supply-Chain Insecurity, third-party dependencies, trust dependencies
Tim looks grim: 10 year old vulnerabilities in widely used dev tool include a CVSS 10.0 remote code execution bug ...
Security Boulevard
ASUS Router User? Patch ASAP!
Richi Jennings | | Asus, Attacking Routers, CVE-2024-3079, CVE-2024-3080, CVE-2024-3912, firmware, firmware attacks, firmware patch, firmware security, firmware update, Firmware Updates, Firmware Vulnerabilities, firmware vulnerability, flawed routers, IoT firmware, Malicious Firmware Updates, router, router compromise, router exploit, router hacking, router hijacking, router malware, router security, router vulnerabilities, router vulnerability, SB Blogwatch
Or junk it if EOL: Two nasty vulnerabilities need an update—pronto ...
Security Boulevard
A Major Industrial Cybersecurity Threat: Living off the Land Attacks
Nathan Eddy | | commercial infrastructure, CPS, Cyber-Physical Systems, Honeywell, ICS, industrial control systems, iot, living off the land, lotl, operational technology, USB
In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Security Boulevard
‘Pumpkin Eclipse’ — 600,000+ Rural ISP Routers Bricked Beyond Repair
Richi Jennings | | ActionTec, Attacking Routers, cable modem, Chalubo, firmware, firmware attacks, firmware patch, firmware security, firmware update, flawed routers, Modem, Pumpkin Eclipse, router, router botnet, router compromise, router exploit, router hacking, router hijacking, router security, router vulnerabilities, router vulnerability, Sagemcom, SB Blogwatch, Windstream
Daft name, serious risk: Kit from ActionTec and Sagemcom remotely ruined and required replacement ...
Security Boulevard