article thumbnail

A new Mirai botnet variant targets DigiEver DS-2105 Pro DVRs

Security Affairs

In November 2024, the Akamai Security Intelligence Research Team (SIRT) observed increased activity targeting the URI /cgi-bin/cgi_main.cgi , linked to a Mirai-based malware campaign exploiting an unassigned RCE vulnerability in DVR devices, including DigiEver DS-2105 Pro. ” reads the analysis published by Akamai. in newer ones.

article thumbnail

InfectedSlurs botnet targets QNAP VioStor NVR vulnerability

Security Affairs

On December 6, The Akamai Security Intelligence Response Team (SIRT) published the first update to the InfectedSlurs advisory series. The security firm revealed that threat actors were exploiting a vulnerability, tracked as CVE-2023-49897 (CVSS score 8.0) and earlier. and earlier. and earlier (5.0.0 released June 21, 2014).

Firmware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Corona Mirai botnet spreads via AVTECH CCTV zero-day 

Security Affairs

Akamai’s Security Intelligence and Response Team (SIRT) has detected a botnet campaign exploiting multiple previously known vulnerabilities and a newly discovered zero-day, tracked as CVE-2024-7029 (CVSS score: 8.7), in AVTECH CCTV cameras. reads the advisory published by CISA.

Firmware 124
article thumbnail

Episode 157: Do we need an FDA for Software? Also: operationalizing Threat Intelligence

The Security Ledger

Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL's big new study of firmware security. In this week’s episode of the Podcast, # 157, sponsored by LookingGlass Cyber Solutions : Sarah Zatko of the Cyber Independent Testing Lab joins us to talk about CITL’s big new study of firmware security.

article thumbnail

Analyzing 4 Common Attack Vectors for Supply Chain Attacks

Thales Cloud Protection & Licensing

In order to secure the software supply chain, it’s important to understand where the potential vulnerabilities lay. This post will analyze the four most common attack vectors used to inject malicious code into legitimate software or firmware. Security Intelligence. Overview Of A Typical Build Process.