Tag: firmware
-
AMD discloses new CPU flaws that can enable data leaks via timing attacks
Tags: access, attack, crowdstrike, cve, cvss, data, exploit, firmware, flaw, guide, leak, malware, microsoft, mitigation, risk, side-channel, strategy, supply-chain, threat, update, vulnerability, windowsCrowdStrike elevates threat classification despite CVSS scores: While AMD rates the vulnerabilities as medium and low severity based on attack complexity requirements, CrowdStrike has independently classified them as critical enterprise threats. The security firm specifically flagged CVE-2025-36350 and CVE-2025-36357 as “Critical information disclosure vulnerabilities in AMD processors,” despite both carrying CVSS scores of just 5.6.According…
-
Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war
The developers behind a custom firmware used to convert consumer drones for military use in Ukraine have reported a cyberattack disrupting the system that distributes the software. First seen on therecord.media Jump to article: therecord.media/cyberattack-russia-firmware-blow-hackers
-
Malware Surge Hits Android: Adware, Trojans and Crypto Theft Lead Q2 Threats
Dr.Web reports Android malware surge in Q2 with adware, banking trojans and crypto theft hidden in fake apps, firmware and spyware targeting users. First seen on hackread.com Jump to article: hackread.com/android-malware-adware-trojan-crypto-theft-q2-threats/
-
Gefährliche Lücke in Brother-Druckern
Tags: access, authentication, bug, ceo, cve, cvss, cybersecurity, data-breach, firmware, jobs, network, service, update, vulnerability, wifiEine Schwachstelle in Brother-Druckern zur Umgehung der Authentifizierung kann mit einer anderen Lücke gekoppelt werden, um Code auf den betroffenen Geräten remote auszuführen.Brother Industries hat mit einer kritischen Sicherheitslücke zu kämpfen, die Hunderte verschiedener Druckermodelle betrifft. Diese Schwachstelle ermöglicht in Verbindung mit einer weiteren Lücke die Ausführung von nicht authentifiziertem Remote-Code (RCE) auf den Geräten.Das…
-
Gefährliche Lücke in Brother Druckern
Tags: access, authentication, bug, ceo, cve, cvss, cybersecurity, data-breach, firmware, jobs, network, service, update, vulnerability, wifiEine Schwachstelle in Brother Druckern zur Umgehung der Authentifizierung kann mit einer anderen Lücke gekoppelt werden, um Remotecode auf den betroffenen Geräten auszuführen.Brother Industries hat mit einer kritischen Sicherheitslücke zu kämpfen, die Hunderte verschiedener Druckermodelle betrifft. Diese Schwachstelle ermöglicht in Verbindung mit einer weiteren Lücke die Ausführung von nicht authentifiziertem Remote-Code (RCE) auf den Geräten.Das…
-
Critical D-Link Router Flaws Allow Remote Code Execution by Attackers
Tags: cyber, firmware, flaw, Hardware, network, remote-code-execution, risk, router, service, vulnerabilityA series of critical security vulnerabilities have been identified in D-Link DIR-816 routers, exposing users worldwide to the risk of remote code execution and network compromise. The flaws affect all hardware revisions and firmware versions of the DIR-816 (non-US), which has reached its End of Life (EOL) and End of Service Life (EOS), meaning no…
-
Some Brother printers have a remote code execution vulnerability, and they can’t fix it
The centerpiece of Rapid7’s disclosure is CVE-2024-51978, a vulnerability rated critical (CVSS 9.8 out of 10) that enables attackers to derive the default administrator password from the device’s serial number.While another of the discovered flaws, a medium severity information disclosure vulnerability (CVE-2024-51977), potentially allows an attacker to leak the prerequisite unique serial number via the…
-
Navigating a Heightened Cyber Threat Landscape: Military Conflict Increases Attack Risks
Tags: advisory, ai, attack, authentication, breach, business, cloud, container, control, cyber, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, finance, firmware, group, hacker, hacking, Hardware, identity, infrastructure, intelligence, Internet, iran, mfa, military, network, password, risk, russia, service, strategy, tactics, technology, terrorism, threat, tool, update, vulnerability, vulnerability-managementThe current geopolitical climate demands a proactive, comprehensive approach to cybersecurity. Here’s what you need to know, and how Tenable can help. The cybersecurity landscape is in constant flux, but rarely do we see such a rapid escalation of threats as we are currently experiencing. The U.S. Department of Homeland Security’s (DHS) National Terrorism Advisory…
-
Sicherheitslücken in 689 Brother- und anderen Druckermodellen (Juni 2025)
Sicherheitsforscher von Rapid 7 habe sich diverse Multifunktionsdrucker im Hinblick auf Schwachstellen angesehen. In der Firmware von 689 Brother-Druckermodellen sind sie fündig geworden. Aber auch einige Drucker anderer Hersteller sind über Schwachstellen angreifbar. Sicherheitsanalyse von Rapid 7 Sicherheitsforscher von Rapid … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/06/27/sicherheitsluecken-in-689-brother-und-anderen-druckermodellen-juni-2024/
-
Sicherheitslücken in 689 Brother- und anderen Druckermodellen (Juni 2024)
Sicherheitsforscher von Rapid 7 habe sich diverse Multifunktionsdrucker im Hinblick auf Schwachstellen angesehen. In der Firmware von 689 Brother-Druckermodellen sind sie fündig geworden. Aber auch einige Drucker anderer Hersteller sind über Schwachstellen angreifbar. Sicherheitsanalyse von Rapid 7 Sicherheitsforscher von Rapid … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/06/27/sicherheitsluecken-in-689-brother-und-anderen-druckermodellen-juni-2024/
-
Brother printer bug in 689 models exposes default admin passwords
A total of 689 printer models from Brother, along with 53 other models from Fujifilm, Toshiba, and Konica Minolta, come with a default administrator password that remote attackers can generate. Even worse, there is no way to fix the flaw via firmware in existing printers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/brother-printer-bug-in-689-models-exposes-default-admin-passwords/
-
Tesla Wall Connector Hacked Through Charging Port in Just 18 Minutes
Security researchers from Synacktiv successfully hacked the Tesla Wall Connector through its charging port in just 18 minutes, exposing critical vulnerabilities in the device’s firmware and communication protocols. The Tesla Wall Connector and Its Architecture The Tesla Wall Connector is an AC electric vehicle charger designed for residential, public, and semi-public installations. Supporting both single-phase…
-
Foreign aircraft, domestic risks
Tags: access, attack, authentication, best-practice, blueteam, breach, computer, control, cyber, cybersecurity, data, defense, detection, encryption, firmware, framework, government, Hardware, injection, leak, malicious, malware, monitoring, network, nist, phone, risk, software, supply-chain, technology, threat, update, vulnerabilityCondensed threat matrix Legacy protocols create new attack surfaces : One of the banes of the OT world is the reliance on legacy technology that cannot easily be patched or upgraded without causing major disruptions. Similarly, the Boeing 747-8 employs a hybrid bus architecture. While it integrates modern flight management technologies like the Thales TopFlight Flight…
-
Microsoft-Signed Firmware Module Bypasses Secure Boot
UEFI Vulnerability Threatens Systems with Silent Compromise. Hackers could circumvent the protections of Secure Boot by silently disabling it through an attack that potentially affects a wide swath of Windows laptops and servers. Microsoft issued a patch this month and hackers would already need admin access and physical access to a target machine. First seen…
-
Insyde UEFI Application Vulnerability Enables Digital Certificate Injection Through NVRAM Variable
A critical vulnerability in Insyde H2O UEFI firmware (tracked as CVE-2025-XXXX) allows attackers to bypass Secure Boot protections by injecting malicious digital certificates via an unprotected NVRAM variable. This flaw exposes millions of devices to pre-boot malware and kernel-level rootkits that evade traditional security monitoring. How SecureFlashCertData Undermines Secure Boot The vulnerability centers on improper…
-
Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable
A critical vulnerability (CVE-2025-4275) in Insyde H2O UEFI firmware allows attackers to bypass Secure Boot protections by injecting malicious digital certificates via an unprotected NVRAM variable. Dubbed Hydroph0bia, this flaw enables pre-boot execution of unsigned code, posing severe risks to enterprise and consumer devices. Insecure NVRAM Variable Handling The vulnerability stems from the improper use…
-
Unmasking the silent saboteur you didn’t know was running the show
Tags: 5G, access, ai, api, attack, authentication, backup, blockchain, breach, ciso, cloud, compliance, control, cybersecurity, data, defense, endpoint, firewall, firmware, GDPR, governance, Hardware, incident response, iot, ISO-27001, login, malicious, network, nis-2, PCI, service, siem, supply-chain, threat, zero-trustCybersecurity depends on accurate clocks : Your logs are only as valuable as your clocks are accurate. If your servers are out of sync, forget to reconstruct timelines. You’ll spend hours chasing phantom alerts. Event correlation and forensics Your SIEM is only as good as the timestamps it gets. Correlating events across endpoints, firewalls and cloud…
-
New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution
The latest wave of Mirai botnet activity has resurfaced with a refined attack chain exploiting CVE-2024-3721, a critical command injection vulnerability in TBK DVR-4104 and DVR-4216 devices. This campaign leverages unpatched firmware to deploy a modified Mirai variant designed for IoT device hijacking and DDoS operations. Exploitation Vector & Payload Delivery Attackers exploit the vulnerability…
-
FIPS 140-3 and You, Part Three
Tags: attack, authentication, ccc, compliance, conference, crypto, cryptography, cybersecurity, data, encryption, firmware, Hardware, international, network, nist, side-channel, software, technology, updateFIPS 140-3 and You, Part Three divya Thu, 06/05/2025 – 07:00 Last spring, in the second installment of this blog series, we were excited to announce that our Luna HSM product line was the first HSM in the industry to achieve FIPS 140-3 level 3 validation certificate. This spring, in this third installment, we happily…
-
ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response
Introduction: A Breach Beyond the EndpointA new campaign targeting ASUS routers has compromised more than 9,000 devices worldwide, exposing a hidden weakness in many organizations’ security strategies: insufficient visibility and control at the edge. The attack, dubbed ViciousTrap, exploits CVE-2023-39780″, a command injection vulnerability”, to deploy malware that persists even after reboots and firmware updates.…
-
ASUS router backdoors affect 9K devices, persist after firmware updates
First seen on scworld.com Jump to article: www.scworld.com/news/asus-router-backdoors-affect-9k-devices-persist-after-firmware-updates
-
Thousands of ASUS Routers Hit by Persistent Backdoor
Persistent Attack Grants Remote SSH Access via Exploit. Someone – possibly nation-state hackers – appears to be constructing a botnet from thousands of Asus routers in hacking that survives a firmware patch and reboots. Nearly 9,000 routers have been compromised and the number is growing, say researchers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/thousands-asus-routers-hit-by-persistent-backdoor-a-28539
-
Thousands of ASUS Routers Hijacked in Stealthy Backdoor Campaign
A threat actor has used ASUS routers’ legitimate features to create persistent backdoors that survive firmware updates and reboots First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/thousands-asus-routers-compromised/
-
Thousands of Asus routers are being hit with stealthy, persistent backdoors
Backdoor giving full administrative control can survive reboots and firmware updates. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/05/thousands-of-asus-routers-are-being-hit-with-stealthy-persistent-backdoors/
-
Popular Industrial Power Monitors Had Remote Hacking Flaws
Researchers Uncover Critical Flaws Enable Remote Device Takeover. A ubiquitous industrial power monitoring device contains three critical vulnerabilities in its firmware that could allow attackers to disrupt operations by remotely crashing them or executing unwanted code. The device is the Rockwell Automation PowerMonitor 1000 Remote. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/popular-industrial-power-monitors-had-remote-hacking-flaws-a-28522
-
BIOS and Bootloaders in the Crosshairs: Growing Firmware Threats
First seen on scworld.com Jump to article: www.scworld.com/brief/bios-and-bootloaders-in-the-crosshairs-growing-firmware-threats
-
Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access
Critical security flaws have been identified in the eCharge Hardy Barth cPH2 and cPP2 charging stations, specifically affecting firmware version 2.2.0. These vulnerabilities, discovered by Stefan Viehböck of SEC Consult Vulnerability Lab, expose electric vehicle (EV) charging infrastructure to severe risks, including system compromise, data breaches, and operational disruption. Despite a responsible disclosure process initiated…
-
Meteobridge Web Interface Vulnerability Let Attackers Inject Commands Remotely
ONEKEY Research Lab has uncovered a severe command injection vulnerability in the MeteoBridge firmware, a compact device designed to connect personal weather stations to public weather networks like Weather Underground. This flaw, identified through ONEKEY’s recently introduced bash static code analysis on their platform, affects versions 6.1 and below of the MeteoBridge firmware, enabling remote,…
-
D-Link Routers Exposed by Hard-Coded Telnet Credential
A recently disclosed vulnerability (CVE-2025-46176) exposes critical security flaws in D-Link’s DIR-605L and DIR-816L routers, revealing hardcoded Telnet credentials that enable remote command execution. The vulnerability affects firmware versions 2.13B01 (DIR-605L) and 2.06B01 (DIR-816L), scoring 6.5 on the CVSS v3.1 scale with medium severity. Security researchers identified improper command neutralization (CWE-77) as the root cause,…

