Aiphone Intercom System Vulnerability Allows Hackers to Open Doors

A vulnerability in Aiphone intercom products allows attackers to breach the entry system and gain access to the building that uses it.
Aiphone is one of the largest global manufacturers of intercom systems, including audio and video entry systems for r… Continue reading Aiphone Intercom System Vulnerability Allows Hackers to Open Doors

CISA Tells Organizations to Patch Linux Kernel Vulnerability Exploited by Malware

The US Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a Linux kernel flaw to its Known Exploited Vulnerabilities Catalog and instructed federal agencies to address it within three weeks.
read more Continue reading CISA Tells Organizations to Patch Linux Kernel Vulnerability Exploited by Malware

Google Unveils KataOS ‘Verifiably-Secure’ Operating System for Embedded Devices

Google last week unveiled a new project focused on building a secure embedded platform for machine learning (ML) applications.
The project’s goal is designing intelligent ambient ML systems that are secure and trustworthy.
read more Continue reading Google Unveils KataOS ‘Verifiably-Secure’ Operating System for Embedded Devices

BAE Releases New Cybersecurity System for F-16 Fighter Aircraft

Defense giant BAE Systems has unveiled Viper Memory Loader Verifier II (MLV II), a system whose role is to protect F-16 fighter aircraft against potential cyberattacks.
MLV II is the second version of a maintenance capability that should “reduce vulner… Continue reading BAE Releases New Cybersecurity System for F-16 Fighter Aircraft

Hacktivist Attacks Show Ease of Hacking Industrial Control Systems

Hacktivists might not know a lot about industrial control systems (ICS), but they’re well aware of the potential implications of these devices getting compromised. That is why some groups have been targeting these systems — which are often unprotected … Continue reading Hacktivist Attacks Show Ease of Hacking Industrial Control Systems