Protect Your Enterprise From BGP Route Hijacking

BGP does a great job of identifying optimal paths across the internet, but its lack of security controls allows the protocol to be exploited. Whenever someone asks me, “What is border gateway routing protocol (BGP)?” I always use the following analogy… Continue reading Protect Your Enterprise From BGP Route Hijacking

5 new vulnerabilities expose the ‘backbone’ of an enterprise network to data theft

A protocol that underpins widely used equipment made by telecommunications giant Cisco is vulnerable to multiple data-stealing attacks, researchers warned Wednesday. The five previously unreported vulnerabilities in implementations of the Cisco protocol — found by Armis Security, a California-based company — show the enduring challenge of keeping one insecure device from being a gateway to another for a hacker. The zero-day bugs affect the many voice-over-IP phones, routers, and switches at corporations around the world that use the protocol for communications. A hacker with enough skill and motivation to exploit the vulnerabilities could gain access to a company’s network and then, for example, take over the VOIP phones on the network to steal data or eavesdrop on calls. The routers and switches that are susceptible to the vulnerabilities form “the backbone of [an enterprise] network,” said Ben Seri, Armis’s vice president of research, who wrote a proof-of-concept for an attack on […]

The post 5 new vulnerabilities expose the ‘backbone’ of an enterprise network to data theft appeared first on CyberScoop.

Continue reading 5 new vulnerabilities expose the ‘backbone’ of an enterprise network to data theft

D-Link Adds More Buggy Router Models to ‘Won’t Fix’ List

The list of routers that have critical RCE bugs, that have reached end of life and that won’t get fixed has grown. Continue reading D-Link Adds More Buggy Router Models to ‘Won’t Fix’ List

Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

The latest edition of the bi-annual hacking contest saw creative exploits in new device categories. Continue reading Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers

Author of record-setting IoT botnets pleads guilty

He kept working on new botnets (and swatting a co-conspirator-cum-competitor) while indicted and on supervised release. Continue reading Author of record-setting IoT botnets pleads guilty