X

Vous n'êtes pas connecté

  - SECURITYAFFAIRS.CO - A La Une - 10/Aug 07:10

BadCam: Linux-based Lenovo webcam bugs enable BadUSB attacks

Lenovo webcam flaws, dubbed BadCam, let attackers turn them into BadUSB devices to inject keystrokes and launch OS-independent attacks. Eclypsium researchers found vulnerabilities in some Lenovo webcams, collectively dubbed BadCam, that could let attackers turn them into BadUSB devices to inject keystrokes and launch OS-independent attacks. Principal security researchers Jesse Michael and Mickey Shkatov demonstrated […]

Articles similaires

Sorry! Image not available at this time

Chaining NVIDIA’s Triton Server flaws exposes AI systems to remote takeover

securityaffairs.co - 05/Aug 07:35

New flaws in NVIDIA’s Triton Server let remote attackers take over systems via RCE, posing major risks to AI infrastructure. Newly revealed...

Sorry! Image not available at this time

CISA warns of N-able N-central flaws exploited in zero-day attacks

bleepingcomputer.com - 14/Aug 09:15

​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and...

Sorry! Image not available at this time

CISA warns of N-able N-central flaws exploited in zero-day attacks

bleepingcomputer.com - 14/Aug 09:15

​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and...

Sorry! Image not available at this time

ReVault flaws let hackers bypass Windows login on Dell laptops

bleepingcomputer.com - 06/Aug 11:58

ControlVault3 firmware vulnerabilities impacting over 100 Dell laptop models can allow attackers to bypass Windows login and install malware that...

Sorry! Image not available at this time

The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks

bleepingcomputer.com - 11/Aug 15:17

Native phishing turns trusted tools into attack delivery systems. Varonis shows how attackers weaponize Microsoft 365 apps, like OneNote & OneDrive,...

Sorry! Image not available at this time

The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks

bleepingcomputer.com - 11/Aug 15:17

Native phishing turns trusted tools into attack delivery systems. Varonis shows how attackers weaponize Microsoft 365 apps, like OneNote & OneDrive,...

Sorry! Image not available at this time

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

securityaffairs.co - 07/Aug 07:20

ReVault flaws in Dell ControlVault3 firmware allow firmware implants and Windows login bypass on 100+ laptop models via physical access. Cisco Talos...

Sorry! Image not available at this time

Smart Buses flaws expose vehicles to tracking, control, and spying

securityaffairs.co - 11/Aug 08:40

Researchers showed how hackers can exploit flaws in a bus’ onboard and remote systems for tracking, control and spying. Researchers Chiao-Lin...

Sorry! Image not available at this time

Smart Buses flaws expose vehicles to tracking, control, and spying

securityaffairs.co - 11/Aug 08:40

Researchers showed how hackers can exploit flaws in a bus’ onboard and remote systems for tracking, control and spying. Researchers Chiao-Lin...

Scientists turn ultrasound into a life-changing power source

knowridge.com - 05/Aug 10:17

Researchers in South Korea have developed a groundbreaking wireless charging technology that could make life much easier—and safer—for patients...