Remove 2009 Remove Firmware Remove Hacking
article thumbnail

10-year-old vulnerability in Avaya VoIP Phones finally fixed

Security Affairs

The vulnerability, tracked as CVE-2009-0692 , could be exploited by an attacker to crash the ISC DHCP client and execute arbitrary code with the permissions of the client. Avaya did not address the vulnerability issue in some of its VoIP devices by applying the necessary patches that were released after the discovery of the flaw in 2009.

Firmware 109
article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Now new findings reveal that AVrecon is the malware engine behind a 12-year-old service called SocksEscort , which rents hacked residential and small business devices to cybercriminals looking to hide their true location online. SocksEscort began in 2009 as “ super-socks[.]com Image: Lumen’s Black Lotus Labs.

Malware 237
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Severe vulnerabilities allow hacking older GE anesthesia machines

Security Affairs

The experts at the healthcare cybersecurity firm CyberMDX have found some flaws in the firmware of the anesthesia machines, the issues could expose patients to serious risks. The company pointed out that it is impossible to change gas mix parameters on systems manufactured after 2009, only older devices are affected by the issues.

Hacking 104
article thumbnail

Devices from Dell, HP, and Lenovo used outdated OpenSSL versions

Security Affairs

The researchers discovered the issue by analyzing firmware images used devices from the above manufacturers. The experts analyzed one of the core frameworks EDKII used as a part of any UEFI firmware which has its own submodule and wrapper over the OpenSSL library ( OpensslLib ) in the CryptoPkg component. that dates back to 2009.

Firmware 102
article thumbnail

EP 31: Stopping the Mirai IoT Botnet, One CnC Server At A Time

ForAllSecure

Vamosi: Welcome to The Hacker Mind and original podcast from ForAllSecure, it's about challenging our expectations about the people who hack for a living. Darki: So there were things happening, you know, for a long time, I guess, like 2009, I guess, was the first ones that came for IoT, but with Mirai. Well, that wasn't really mature.

IoT 52
article thumbnail

Zero Trust: Can It Be Implemented Outside the Cloud?

eSecurity Planet

Add to that the complexity of third-party reliance, like what if one of the software packages you use for say multi-factor authentication was hacked (think Okta ) and someone was able to enter your system, circumventing the zero trust border. Even the local public schools near where I live have been hacked. Have the CSPs been hacked?

Insurance 109
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. It's about challenging her expectations about the people who hack reliving. And what it's like to hack sensors such as a lidar, or even a smart meter. Vamosi: Hash initially didn't start out hacking smart meters.