Remove 2010 Remove Firmware Remove Technology
article thumbnail

China-linked APT BlackTech was spotted hiding in Cisco router firmware

Security Affairs

US and Japanese authorities warn that a China-linked APT BlackTech planted backdoor in Cisco router firmware to hack the businesses in both countries. BlackTech is a Chinese APT group that has been active since at least 2010 and that known for conducting cyber espionage campaigns in Asia aimed at entities in Hong Kong, Japan, and Taiwan.

Firmware 141
article thumbnail

How to Protect Operational Technology (OT) from Cyber Threats

CyberSecurity Insiders

By Jayakumar (Jay) Kurup, Global Sales Engineering Director at Morphisec Securing operational technology (OT) creates unique challenges. Sometimes this is due to cultural reasons (management’s fear of even the slightest chance of disruption); other times, it is technological.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MI5 chief warns of Chinese cyber espionage reached an unprecedented scale

Security Affairs

“If you’re working today at the cutting edge of technology then geopolitics is interested in you, even if you’re not interested in geopolitics.” ” Commercial businesses in the technology sector of any size, especially small companies and start-ups and researchers, are more exposed to Chinese espionage. .

article thumbnail

Router security in 2021

SecureList

Number of router vulnerabilities according to cve.mitre.org, 2010–2022 ( download ). Number of router vulnerabilities according to nvd.nist.gov, 2010–2022 ( download ). Make sure to update the firmware. Discovered back in 2016, it remains the most common malware infecting IoT devices. Conclusion.

DDOS 134
article thumbnail

SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors

Security Affairs

Garbelini , Sudipta Chattopadhyay, and Chundong Wang from the Singapore University of Technology and Design. The protocol Bluetooth Low Energy (BLE) was released in 2010 and it is designed to implement a new generation of services for mobile applications. The group was composed of researchers Matheus E. SDK (CVE-2019-17519).

IoT 141
article thumbnail

ISaPWN – research on the security of ISaGRAF Runtime

SecureList

The following potential vectors of attacks on ISaGRAF-based devices have been identified: A remote unauthenticated attacker could execute privileged commands of the IXL service on devices with ISaGRAF Runtime versions released before 2010. A remote attacker could easily implement a password brute force attack in ISaGRAF Runtime.

article thumbnail

California Passes First Of Its Kind IoT Cybersecurity Law

Privacy and Cybersecurity Law

California recently became the first state in the union to pass a cybersecurity law addressing “smart” devices and Internet of Things (IoT) technology. The term IoT generally refers to anything connected to the internet, including smart home devices (e.g., Amazon’s Alexa, NEST thermostats, etc.). Code § 1798.91.06(a))

IoT 45