Thursday, May 1, 2025

IoT

30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers

Researchers discovered a serious flaw in more than 30,000 IoT connected bathtubs that can be authenticated by remote attackers to control the vulnerable tub...

FreeRTOS IoT OS Critical Vulnerabilities Affected Million of Smart Home & Critical Infrastructure Based IoT Devices

A critical Vulnerabilities that affected FreeRTOS TCP/IP Stack puts millions of IoT devices at risk and let attackers allows to compromise the Smart home devices and Critical...

Most Important Cybersecurity Risk Mitigating for Connected Vehicles

Staying connected when managing or owning a fleet is crucial. It is the only way to have real-time data and the monitoring of performance....

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as  CVE-2016-10401 to propagate malicious code and steal the victim's sensitive information. HNS communication...

Key Ways to Stop Hackers From Invading Your Smart Home

If you’re like millions of other people around the world, you have at least one, if not many, smart home products on your property....

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices

New Mac Cyptominer Malware  XMRig affected Mac users that cause a sudden increase of the CPU process called mshelper and the fans are running...

100 Million IoT Smart Devices are Vulnerable to Z-Wave Wireless Communications Protocol Downgrade Attack

Z-Wave, a Wireless Communication Protocol that widely used in IoT Smart Devices vulnerability allow attackers to perform Downgrade Attack and compromise nearly 100 Million...

Multiple Vulnerabilities in D-Link Routers Allows Hackers Gain Complete Control & Extract Sensitive Data

Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default credentials to gain high...