Billions of Devices at Risk of Hacking & Impersonation Due to Hidden Commands

Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. Continue reading Billions of Devices at Risk of Hacking & Impersonation Due to Hidden Commands

Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets

Multiple Mirai-based botnets are exploiting CVE-2025-1316, an Edimax IP camera vulnerability that allows remote command execution.
The post Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets appeared first on SecurityWeek.
Continue reading Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets

Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare

The Contec CMS8000 patient monitors do not contain a malicious backdoor but are plagued by an insecure and vulnerable design.
The post Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare appeared first on SecurityWeek.
Continue reading Contec Patient Monitors Not Malicious, but Still Pose Big Risk to Healthcare