Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash. Continue reading Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS
Collaborate Disseminate
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash. Continue reading Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS
Telcom firm leaves port open on customer routers after maintenance update exposing hundreds of customers to possible attack. Continue reading Singapore ISP Leaves 1,000 Routers Open to Attack
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to a downgrade attack during pairing sessions. Continue reading Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim
Researchers warn of malware infecting 500,000 popular routers in a campaign mostly targeting the Ukraine, but also 54 other countries. Continue reading VPNFilter Malware Infects 500k Routers Including Linksys, MikroTik, NETGEAR
A bug in Comcast’s activation website for its Xfinity routers leaked sensitive customer data. Continue reading Comcast Patches Router Bug That Leaked Some Wi-Fi Passwords
A botnet called Brain Food is pushing diet pills via infected WordPress and Joomla websites. Continue reading Malicious PHP Script Infects 2,400 Websites in the Past Week
Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials. Continue reading Misconfigured Reverse Proxy Servers Spill Credentials
The company urges customers to patch three vulnerabilities that received the highest severity rating of 10. Continue reading Cisco Warns of Three Critical Bugs in Digital Network Architecture Platform
Cryptominer WinstarNssmMiner is an aggressive malware strain that has launched 500,000 attacks in the past three days earning criminals $28,000. Continue reading New Cryptominer Distributes XMRig in Aggressive Attacks
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations. Continue reading Attackers Use UPnP to Sidestep DDoS Defenses