Sun.Aug 11, 2019

article thumbnail

Boffins hacked Siemens Simatic S7, most secure controllers in the industry

Security Affairs

A group of Israeli researchers demonstrated that it is possible to take over the Simatic S7 controller one of the most secure controllers in the industry. A team of Israeli researchers demonstrated that it is possible to take control of the Simatic S7 controller without the knowledge of the operators. The team was composed of researchers from the Cyber ??

Security 111
article thumbnail

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

WIRED Threat Level

A security researcher has demonstrated how to force everyday commercial speakers to emit harmful sounds.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gaining remote code execution using a tainted SQLite database

Security Affairs

Experts demonstrated that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps. Experts at CheckPoint discovered that SQLite database can be abused by threat actors as an attack vector to execute malicious code in other apps, including Apple’s. The experts presented the attack technique at the DEF CON security conference in Las Vegas. “We discovered that simply querying a malicious SQLite database – can lead to Remote Code E

article thumbnail

DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR

Threatpost

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

IoT 72
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Security Affairs

Researchers discovered multiple flaws in more than 40 device drivers from at least 20 different vendors that could to install a persistent backdoor on Windows PCs. Experts at firmware security firm Eclypsium have conducted a study on the device drivers from major vendors and discovered serious issues in over 40 drivers from 20 companies. The researchers warn that the vulnerabilities that can be exploited by attackers to deploy persistent backdoor on vulnerable systems.

Access 83

More Trending

article thumbnail

Security Affairs newsletter Round 226

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you! DealPly adware abuses reputation services to remain under the radar.

article thumbnail

Digital Right to Repair Movement seeks Allies at DEF CON

The Security Ledger

A grass roots movement to win a legal right to repair digital devices arrived at DEF CON in Las Vegas on Saturday with a message for an estimated 30,000 attendees: 'fight for repair.'. Related Stories Episode 160 Right to Repair’s Summer of Love – Sort of. Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Episode 155: Disinformation is a Cyber Weapon and APTs warm to Mobile Malware.

article thumbnail

Watch a Drone Take Over a Nearby Smart TV

WIRED Threat Level

Smart TVs continue to look dumber by the day.

article thumbnail

Michigan Medicine makes AI, machine learning a top tech priority

Information Management Resources

The academic medical center of the University of Michigan is leveraging investments in artificial intelligence, machine learning and advanced analytics to unlock the value of its health data.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.