Hacking police radios: 30-year-old crypto flaws in the spotlight
by Paul Ducklin If you’d been quietly chasing down cryptographic bugs in a proprietary police radio system since 2021, but...
by Paul Ducklin If you’d been quietly chasing down cryptographic bugs in a proprietary police radio system since 2021, but...
The healthcare industry is under a constant barrage of cyberattacks. It has traditionally been one of the most frequently targeted...
Research from Vectra AI indicates that 71% of Organisations may have been breached and do not know about it, highlighting...
Jul 21, 2023THNCyber Threat / Malware A new malware strain known as BundleBot has been stealthily operating under the radar...
Jul 21, 2023THNVulnerability / Botnet Several distributed denial-of-service (DDoS) botnets have been observed exploiting a critical flaw in Zyxel devices...
Claroty, the cyber-physical systems protection company, has been recognised as a Representative Vendor in the 2023 Gartner Market Guide for...
Jul 20, 2023THNHardware Security / SysAdmin Two more security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC)...
Jul 20, 2023THNVulnerability / Software Security Multiple security flaws have been disclosed in Apache OpenMeetings, a web conferencing solution, that...
Jul 20, 2023The Hacker News If it seems like Remote Desktop Protocol (RDP) has been around forever, it's because it...
Jul 20, 2023THNCyber Attack / Malware The defense sector in Ukraine and Eastern Europe has been targeted by a novel...
As per RBR London’s Mobile Self-Scanning and Checkout-Free 2022 study, there has been a threefold increase in the number of...
She adds: “While it has been common practice for years in tech and leading-edge companies, I am beginning to see...
The source code for the BlackLotus UEFI bootkit has been published on GitHub and experts warn of the risks of...
Jul 14, 2023THNVulnerability/ Cyber Threat Multiple security vulnerabilities have been discovered in various services, including Honeywell Experion distributed control system...
Jul 14, 2023THNCyber Threat / Cloud Security A malicious actor has been linked to a cloud credential stealing campaign in...