The ’80s Multi-Processor System That Never Was

Until the early 2000s, the computer processors available on the market were essentially all single-core chips. There were some niche layouts that used multiple processors on the same board for …read more Continue reading The ’80s Multi-Processor System That Never Was

QR code SQL injection and other vulnerabilities in a popular biometric terminal

The report analyzes the security properties of a popular biometric access control terminal made by ZkTeco and describes vulnerabilities found in it. Continue reading QR code SQL injection and other vulnerabilities in a popular biometric terminal

Vulnerability in Cisco Webex cloud service exposed government authorities, companies

The vulnerability that allowed a German journalist to discover links to video conference meetings held by Bundeswehr (the German armed forces) and the Social Democratic Party of Germany (SPD) via their self-hosted Cisco Webex instances similarly affect… Continue reading Vulnerability in Cisco Webex cloud service exposed government authorities, companies

Iranian hackers impersonate journalists in social engineering campaign 

Members of a notorious Iranian hacking crew are using false personas to steal credentials and access victim cloud environments, per a new Mandiant report.

The post Iranian hackers impersonate journalists in social engineering campaign  appeared first on CyberScoop.

Continue reading Iranian hackers impersonate journalists in social engineering campaign