Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé Firmware  ✕
Industrial networking manufacturer Moxa reports 'critical' router bugs https://cyberscoop.com/industrial-networking-manufacturer-moxa-reports-critical-router-bugs/
12/01/2025 21:13:47
QRCode
archive.org
thumbnail

Firmware in cellular routers, secure routers and network security appliances made by Moxa are vulnerable to a pair of high severity bugs.

cyberscoop EN 2025 vulnerability Firmware Moxa iot CVE-2024-9138 CVE-2024-9140
CVE-2024-36435 Deep-Dive: The Year’s Most Critical BMC Security Flaw https://www.binarly.io/blog/cve-2024-36435-deep-dive-the-years-most-critical-bmc-security-flaw
29/09/2024 18:56:35
QRCode
archive.org

The Binarly REsearch team has consistently uncovered security vulnerabilities in the Baseboard Management Controller (BMC) firmware -- a critical component of modern data center infrastructure. These vulnerabilities can be exploited remotely by threat actors, posing significant risk to enterprises.

In a previous report, “Old But Gold: The Underestimated Potency of Decades-Old Attacks on BMC Security,” we documented the BMC architecture in detail and showed that it is still possible to find classes of vulnerabilities known from the early 2000s.

binarly EN 2024 BMC firmware CVE-2024-36435 flow Supermicro research
Apple fixed a bug in Magic Keyboard that allows to monitor Bluetooth traffic https://securityaffairs.com/157448/hacking/apple-bug-monitor-bluetooth-traffic.html
16/01/2024 08:52:14
QRCode
archive.org
thumbnail

Apple addressed a recently disclosed Bluetooth keyboard injection vulnerability with the release of Magic Keyboard firmware.

securityaffairs EN 2024 Magic Keyboard firmware Bluetooth CVE-2024-0230
The Far-Reaching Consequences of LogoFAIL https://binarly.io/posts/The_Far_Reaching_Consequences_of_LogoFAIL/index.html
02/12/2023 11:44:08
QRCode
archive.org
thumbnail

The Binarly REsearch team investigates vulnerable image parsing components across the entire UEFI firmware ecosystem and finds all major device manufacturers are impacted on both x86 and ARM-based devices.

binarly EN 2023 UEFI firmware LogoFAIL
Routers have been rooted by Chinese spies US and Japan warn https://www.theregister.com/2023/09/27/us_japan_routers/
30/09/2023 00:51:22
QRCode
archive.org
thumbnail

BlackTech crew looking to steal sensitive data traffic

theregister EN 2023 Routers US Japan China BlackTech firmware
Leak of Intel Boot Guard Keys Could Have Security Repercussions for Years https://www.darkreading.com/attacks-breaches/leak-of-intel-boot-guard-keys-could-have-security-repercussions-for-years
11/05/2023 08:55:48
QRCode
archive.org
thumbnail

While Intel is still investigating the incident, the security industry is bracing itself for years of potential firmware insecurity if the keys indeed were exposed.

The potential leak from MSI Gaming of signing keys for an important security feature in Intel-based firmware could cast a shadow on firmware security for years to come and leave devices that use the keys highly vulnerable to cyberattacks, security experts say.

darkreading EN 2023 MSI leak Intel firmware
MSI's (in)Secure Boot https://dawidpotocki.com/en/2023/01/13/msi-insecure-boot/
16/01/2023 06:35:44
QRCode
archive.org

On 2022-12-11, I decided to setup Secure Boot on my new desktop with a help of sbctl. Unfortunately I have found that my firmware was… accepting every OS image I gave it, no matter if it was trusted or not. It wasn't the first time that I have been self-signing Secure Boot, I wasn't doing it wrong.

As I have later discovered on 2022-12-16, it wasn't just broken firmware, MSI had changed their Secure Boot defaults to allow booting on security violations(!!).

dawidpotocki EN 2023 MSI SecureBoot broken insecure firmware
Guerre en Ukraine : les utilisateurs du réseau satellitaire Viasat victimes d’une cyberattaque https://www.lemonde.fr/pixels/article/2022/03/08/guerre-en-ukraine-les-utilisateurs-du-reseau-satellitaire-viasat-victiment-d-une-cyberattaque_6116600_4408996.html
09/03/2022 16:45:05
QRCode
archive.org
thumbnail

Des milliers de particuliers et d’entreprises européennes sont sans connexion depuis le 24 février. De plus en plus d’éléments pointent vers le sabotage d’un satellite, en lien avec le conflit ukrainien.

Ukraine FR 2022 cyberwar lemonde Viasat sabotage satellite firmware
4368 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio