Cyberattckers can easily exploit a command-injection bug in the popular device, but Belkin has no plans to address the security vulnerability.
Related Posts
Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation
Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation
Quarkslab finds serious, remotely exploitable vulnerabilities in EDK II, the de-facto open source reference implementation of the UEFI spec.
The post Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation appeared first on SecurityWeek.
SecurityWeek RSS Feed
LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants
LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants.
Russian cybersecurity company Kaspersky said it detected a ransomware intrusion that deployed a version of LockBit but with a markedly different ransom demand procedure.
"The attacker behind this incident decided to use a different ransom note with a headline related to a Read More
The Hacker News | #1 Trusted Cybersecurity News Site
Reusing passwords: The hidden cost of convenience
Reusing passwords: The hidden cost of convenience
Password reuse might seem like a small problem — but it can have far-reaching consequences for an organization’s cybersecurity. Learn more from Specops Software about what IT teams can do to combat the problem. […] Read More
BleepingComputer