The active attacks could result in critical-infrastructure damage, business disruption, lateral movement and more.
Threatpost
Posts tagged "devices"
Most QNAP NAS Devices Affected by ‘Dirty Pipe’ Linux Flaw
The “Dirty Pipe” Linux kernel flaw – a high-severity vulnerability in all major distros that grants root access to unprivileged users who have local access – affects most of QNAP’s network-attached storage (NAS) appliances, the Taiwanese manufacturer warned on Monday. Dirty Pipe, a recently reported local privilege escalation vulnerability, affects the Linux kernel on QNAP […]
Threatpost
Most QNAP NAS Devices Affected by ‘Dirty Pipe’ Linux Flaw
The “Dirty Pipe” Linux kernel flaw – a high-severity vulnerability in all major distros that grants root access to unprivileged users who have local access – affects most of QNAP’s network-attached storage (NAS) appliances, the Taiwanese manufacturer warned on Monday. Dirty Pipe, a recently reported local privilege escalation vulnerability, affects the Linux kernel on QNAP […]
Threatpost
Zero-Click Flaws in Widely Used UPS Devices Threaten Critical Infratructure
The ‘TLStorm’ vulnerabilities, found in APC Smart-UPS products, could allow attackers to cause both cyber and physical damage by taking down critical infrastructure.
Threatpost
Novel Attack Turns Amazon Devices Against Themselves
Researchers have discovered how to remotely manipulate the Amazon Echo through its own speakers.
Threatpost
‘Dark Herring’ Billing Malware Swims onto 105M Android Devices
The mobile malware heisted hundreds of millions of dollars from unsuspecting users, thanks to 470 different well-crafted malicious app in Google Play.
Threatpost
BRATA Android Trojan Updated with ‘Kill Switch’ that Wipes Devices
Researchers identify three new versions of the banking trojan that include various new features, including GPS tracking and novel obfuscation techniques.
Threatpost
QNAP: Get NAS Devices Off the Internet Now
There are active ransomware and brute-force attacks being launched against internet-exposed, network-attached storage devices, the device maker warned.
Threatpost
Your device’s safety in someone else’s hands: root and jailbreak
Rooting and jailbreaking are used to circumnavigate limitations on Android and iOS system but these strategies can have serious affects on a device’s security
Mac Zero Day Targets Apple Devices in Hong Kong
Google researchers have detailed a widespread watering-hole attack that installed a backdoor on Apple devices that visited Hong Kong-based media and pro-democracy sites.