Remove Education Remove How To Remove Information Security Remove Manufacturing
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

The only way to tackle this challenge is to educate the users about these threats and their potential implications. Furthermore, consumers believe that companies and services have the responsibility of keeping their data secure. The Flaws in Manufacturing Process. Pierluigi Paganini. SecurityAffairs – hacking, IoT).

IoT 133
article thumbnail

China-linked APT Volt Typhoon remained undetected for years in US infrastructure

Security Affairs

In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and take control of alarms and plugs. Below is a video demo published by the researcher that shows how to exploit the flaw CVE-2023–1748 to obtain users’ info.

article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Other research by Cybernews has revealed that BMW , a German luxury vehicle manufacturer producing around 2.5 How to protect your data? The issue causing the leak has been fixed.

Retail 92
article thumbnail

China-linked Flax Typhoon APT targets Taiwan

Security Affairs

Microsoft has not observed The group has been active since mid-2021, it focuses on government agencies and education, critical manufacturing, and information technology organizations in Taiwan. Microsoft also provided instructions on how to investigate suspected compromised accounts or affected systems.

article thumbnail

MITRE and CISA publish the 2021 list of most common hardware weaknesses

Security Affairs

MITRE and the DHS’s Cybersecurity and Infrastructure Security Agency (CISA) have announced the release of the “2021 Common Weakness Enumeration (CWE) Most Important Hardware Weaknesses” list. “Security analysts and test engineers can use the list in preparing plans for security testing and evaluation.

article thumbnail

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

As of April 28, the site mentioned nine companies primarily from aviation, financial, education and manufacturing industries. As always, the document contains instructions on how to remove “protection”: Figure 2. Such emails are disguised to look like DocuSign notifications: Figure 1.