HackDig : Dig high-quality web security articles for hackers

Mozi Botnet Accounted for Majority of IoT Traffic: IBM

Mozi, a relatively new botnet, has fueled a significant increase in Internet of Things (IoT) botnet activity, IBM reported this week.Showing code overlaps with Mirai and its variants and reusing Gafgyt code, Mozi has been highly active over the past year, and it accounted for 90% of the IoT network traffic observed between October 2019 and June 2020, althoug
Publish At:2020-09-19 10:44 | Read:364 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

CISA Named Top-Level Root CVE Numbering Authority

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been named a Top-Level Root CVE Numbering Authority (CNA) and it will be overseeing CNAs that assign CVE identifiers for vulnerabilities in industrial control systems (ICS) and medical devices.CNAs are responsible for issuing CVE identifiers for vulnerabilities found in their own or third-p
Publish At:2020-09-17 07:54 | Read:143 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Vulnerabilities Management &

Nozomi Networks Becomes CVE Numbering Authority

Nozomi Networks, a company that specializes in the security of OT and IoT systems, on Tuesday announced that it has become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA).As a CNA, the company will be able to assign CVE identifiers to vulnerabilities found in its own products or in third-party IoT and industrial products that are not c
Publish At:2020-09-16 12:22 | Read:59 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Vulnerabilities Management &

U.S. House Passes IoT Cybersecurity Bill

The U.S. House of Representatives this week passed the IoT Cybersecurity Improvement Act, a bill whose goal is to improve the security of IoT devices.First introduced in 2017 and reintroduced in 2019, the IoT Cybersecurity Improvement Act will now have to pass the Senate before it can be signed into law by the president.The bipartisan legislation is backed b
Publish At:2020-09-16 12:22 | Read:134 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Management & Strateg

Flaws in Philips Patient Monitoring Products Can Lead to Patient Data Exposure

Multiple vulnerabilities identified in Philips patient monitoring solutions could provide attackers with unauthorized access to patient data.A total of eight security issues were identified. Although they feature severity ratings of medium and low, even low-skilled hackers could exploit them, the Cybersecurity and Infrastructure Security Agency (CISA) warns
Publish At:2020-09-16 04:32 | Read:149 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities IoT Security

Researchers Hijack 28,000 Printers to Show How Easily They Can Be Hacked

Researchers have once again demonstrated that many printers can be hacked remotely, by hijacking 28,000 devices and instructing them to print out a printer security guide.The research was conducted by security experts at CyberNews, who claim to have identified more than 800,000 printers that were accessible over the internet and had network printing features
Publish At:2020-08-27 15:32 | Read:184 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Risk Management Vuln

IoT Devices in Different Industries and How to Secure Them

Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization.The digitization in day-to-day human activities has been revolutionized by the Internet of Things (IoT). Based on Gartner’s Forecast database, we can expect that there will be approximately 14 bil
Publish At:2020-08-26 01:24 | Read:222 | Comments:0 | Tags:Featured Articles Internet of Things IoT security Security F

Microsoft Patches Code Execution, Privilege Escalation Flaws in Azure Sphere

Recently addressed Microsoft Azure Sphere vulnerabilities could lead to the execution of arbitrary code or to elevation of privileges, Cisco Talos’ researchers warn.The cloud-based system on a chip (SoC) platform was designed for Internet of Things (IoT) security, and is comprised of a hardware platform (several ARM cores, each with a different role), Azure
Publish At:2020-08-25 12:42 | Read:254 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities IoT Security privilege

Vulnerability in Thales Product Could Expose Millions of IoT Devices to Attacks

Security researchers at IBM have discovered a potentially serious vulnerability in a communications module made by Thales for IoT devices. Millions of devices could be impacted, but the vendor released a patch six months ago.The flaw, tracked as CVE-2020-15858, was discovered in September 2019 and it was patched in February 2020. It was initially identified
Publish At:2020-08-19 11:57 | Read:221 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities IoT Security Vulnerabili

HDL Smart Devices in Homes and Buildings Exposed to Hacker Attacks

Vulnerabilities in HDL Automation smart products could be abused to take over user accounts and remotely control devices deployed in homes, commercial buildings or hotels, SentinelOne reports.The issues, SentinelOne researcher Barak Sternberg explained at the DEF CON conference last week, were identified in an HDL automation system that allows users to contr
Publish At:2020-08-11 12:50 | Read:270 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities IoT Security

DEF CON 2020 Wrap-Up: Hacking Phones, Cars and Satellites

Tens of researchers showcased their work last week at the DEF CON hacking conference. They presented research on hacking phones, cars, satellite communications, traffic lights, smart home devices, printers, and popular software services, among many others.Here is a summary of some of the most interesting presentations from DEF CON 2020:Hacking Samsung smartp
Publish At:2020-08-11 09:30 | Read:196 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Wire

Black Hat Wrap-Up: IoT and Hardware Vulnerabilities Take the Spotlight

The first entirely virtual edition of the Black Hat cybersecurity conference took place last week and researchers from tens of organizations presented the results of their work from the past year.Some of the most interesting presentations focused on vulnerabilities affecting industrial, IoT, hardware and web products, but a few of the talks covered endpoint
Publish At:2020-08-10 15:17 | Read:291 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY SCADA / ICS Vulnerabil

Chinese Researchers Show How They Remotely Hacked a Mercedes-Benz

A team of Chinese researchers has described the analysis process that resulted in the discovery of 19 vulnerabilities in a Mercedes-Benz E-Class, including flaws that can be exploited to remotely hack a car.The research was conducted starting in 2018 by Sky-Go, the vehicle cybersecurity unit of Chinese security solutions provider Qihoo 360. The findings were
Publish At:2020-08-07 15:41 | Read:295 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

Qualcomm, MediaTek Wi-Fi Chips Vulnerable to Kr00k-Like Attacks

The Kr00k vulnerability disclosed earlier this has only been found to impact devices using Wi-Fi chips from Broadcom and Cypress, but researchers revealed this week that similar flaws have been discovered in chips made by Qualcomm and MediaTek.Cybersecurity firm ESET reported in February that billions of Wi-Fi-capable devices may have been at one point affec
Publish At:2020-08-07 11:51 | Read:312 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities Mobile

Tripwire Research: IoT Smart Lock Vulnerability Spotlights Bigger Issues

The mechanical lock is perhaps the most fundamental, tangible, and familiar layer of security in our daily lives. People lock their doors with the expectation that these locks will keep the bad people out, but there’s a common adage in the security industry that locks are only good at keeping honest people honest. This is perhaps truer than ever in the era o
Publish At:2020-08-05 10:11 | Read:187 | Comments:0 | Tags:Featured Articles Internet of Things IoT security MQTT smart


Tag Cloud