article thumbnail

Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications

Security Affairs

Documents belonging to the Swiss Air Force were leaked on the dark web as a result of cyberattack on a US security provider. Documents belonging to the Swiss Air Force were leaked on the dark web after the US security company Ultra Intelligence & Communications suffered a data breach. ” reported the SwissInfo website.

article thumbnail

DoppelPaymer crew leaked internal confidential documents belonging to aerospace companies

Security Affairs

DoppelPaymer hackers leaked online internal confidential documents belonging to some of the largest aerospace companies in the world. The gang behind the DoppelPaymer ransomware has stolen internal confidential documents belonging to some of the largest aerospace companies in the world from the industrial contractor Visser Precision.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TWAIN Working Group Announces TWAIN Direct Developers Day Event: participants will develop a TWAIN Direct document scanning application in one day

Info Source

This event will encourage scanner manufacturers, Independent Software Vendors as well businesses evolve their Capture strategy with driverless web and mobile document scanning applications by eliminating the need for legacy USB scanner connectivity. This event is supported by Silver Sponsor Visioneer, Inc.,

article thumbnail

TWAIN Working Group Announces TWAIN Direct Developers Day Event: participants will develop a TWAIN Direct document scanning application in one day

Info Source

This event will encourage scanner manufacturers, Independent Software Vendors as well businesses evolve their Capture strategy with driverless web and mobile document scanning applications by eliminating the need for legacy USB scanner connectivity. This event is supported by Silver Sponsor Visioneer, Inc.,

article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

For any IoT device vendors currently contracted by the government, this is what we know so far from the National Institute of Standards and Technology (NIST): Required reading for IoT manufacturers: foundational guidelines about IoT vulnerabilities ( 8259 ) and a core baseline of necessary cybersecurity components ( 8259A ). Data protection.

IoT 145
article thumbnail

P2P Weakness Exposes Millions of IoT Devices

Krebs on Security

A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. Marrapese documented his findings in more detail here.

IoT 262
article thumbnail

New RedLine malware version distributed as fake Omicron stat counter

Security Affairs

Like other COVID-19 themed malspam campaigns, the infection chain starts by opening a weaponized document used as an attachment. Over the course of the few weeks after this variant was released, we noticed one IP address in particular communicating with this C2 server.” This variant uses 207[.]32.217.89