Please turn on your JavaScript for this page to function normally.
smart city building light
Smart cities are exposed to old-school threats

Spurred by the false alarm that made Hawaii residents fear for their lives earlier this year, IBM X-Force Red and Threatcare researchers have decided to test several smart …

healthcare
OpenEMR vulnerabilities put patients’ info, medical records at risk

A slew of vulnerabilities in OpenEMR allowed attackers to access random patients’ health records, view data from a target database, escalate their privileges on the …

HP
HP plugs critical RCE flaws in InkJet printers

HP has plugged two critical vulnerabilities (CVE-2018-5924, CVE-2018-5925) affecting many of its InkJet printers and is urging users to implement the provided firmware updates …

Monero
Compromised MikroTik routers power extensive cryptojacking campaign

A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker …

prison
Idaho inmates hacked prison system to add money to their accounts

364 inmates at five correctional facilities in Idaho have managed to add nearly a quarter million dollars worth of credit to their JPay accounts by exploiting a vulnerability …

Samsung SmartHub
Samsung SmartThings Hub vulnerabilities allow attackers inside your home

Cisco Talos researchers have unearthed 20 vulnerabilities in the Samsung SmartThings Hub that could be leveraged by attackers to monitor, control and interfere with devices …

vulnerability
Same web-based vulnerabilities still prevalent after nine years

Analysis of vulnerabilities discovered by NCC Group researchers over the last nine years found that instances of common web-based vulnerabilities have largely refused to fall …

Swann
Swann security cameras vulnerable to spying hack

Researchers have unearthed a security flaw in a Swann security camera that allows attackers to spy on the video and audio feed of anyone’s camera. Swann SWWHD-Intcam is …

Bluetooth
Bluetooth vulnerability allows snooping of traffic between paired devices

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …

bug
Exploring the dynamics of the attacker economy

Global software companies are increasingly turning to attackers for help identifying security vulnerabilities in their offerings – and they’re not the only ones. Conservative …

Cisco
Cisco plugs serious flaws in Policy Suite, SD-WAN, and Nexus switches

Cisco has issued another batch of fixes, plugging a number of critical and high severity holes in its Policy Suite, SD-WAN, and Nexus products. Cisco Policy Suite Users of the …

Polar Flow
Fitness app Polar Flow reveals home addresses of soldiers, spies

Polar Flow can reveal sensitive information about the lives of users, including intelligence agents, embassy workers, military men and women, workers at nuclear weapons …

Don't miss

Cybersecurity news