article thumbnail

New PumaBot targets Linux IoT surveillance devices

Security Affairs

It checks the environment to avoid honeypots or restricted systems and looks specifically for the term Pumatronix, a maker of surveillance and traffic cameras, hinting at IoT targeting or an attempt to bypass certain devices. ” states the report.

article thumbnail

The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets

Security Affairs

The trend of malicious targeting in the drone manufacturing segment increased during Q3-Q4 2024 and continued into Q1 2025. Unmanned Aerial Vehicles (UAVs), commonly known as drones, have become integral to modern military operations, particularly for intelligence, surveillance, and reconnaissance (ISR) missions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Air fryers are the latest surveillance threat you didn’t consider

Malwarebytes

An easy solution is not to install the app, and don’t provide manufacturers with personal data they do not need to know. Ask yourself if the appliance needs to be smart. What’s in it for you, and what’s the price you’re going to pay?

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

How cars became the worst product category for privacy Session Covers the extensive data collection (and subsequent sharing with car manufacturers and their affiliates) enabled by modern vehicles; they can collect way beyond location data. They regularly use people's personal information to set tailored prices.

article thumbnail

Synthetic Sabotage: How AI Tools Are Fueling Tailored Phishing Campaigns at Scale

SecureWorld News

These attacks don't just target specific bits of informationtheir goal are entire surveillance systems , production workflows, and collections of trade secrets. A call to confront synthetic sabotage We're entering a phase where authenticity can be synthetically manufactured, and that shift demands a new posture.

article thumbnail

Threat Modeling the Genomic Data Sequencing Workflow (Threat Model Thursday)

Adam Shostack

The example of a dos threat being high impact for a disease surveillance lab, and low impact to an agricultural researcher is great. Consider changing it to an outbound request to the manufacturer, and having the binary file be signed and the signature validated. How does that activity differ from whats in this guide? is excellent.

article thumbnail

WAGO Device Manager Vulnerabilities Expose Critical Industrial Infrastructure to Remote Exploits

Penetration Testing

It enables technicians to configure, monitor, and manage programmable logic controllers (PLCs) and other WAGO components used in automation environments across manufacturing, energy, and transportation sectors. The WAGO Device Manager is a configuration tool embedded in the firmware of WAGO’s industrial control systems (ICS).