article thumbnail

Gangnam Industrial Style APT campaign targets industrial firms worldwide

Security Affairs

Experts from the CyberX’s threat intelligence team Section 52 uncovered an ongoing cyberespionage campaign, tracked as Gangnam Industrial Style, that targeted industrial, engineering, and manufacturing organizations, most of them in South Korea (60%). ” reads the report published by the CyberX experts.

article thumbnail

Cable Haunt flaw exposes 200M+ Broadcom-based cable modems at remote hijacking

Security Affairs

The reason for this is that the vulnerability originated in reference software, which has seemingly been copied by different cable modems manufacturers when creating their cable modem firmware. Secondly the vulnerable endpoint is hit with a buffer overflow attack, which gives the attacker control of the modem.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Boffins discovered seven new Meltdown and Spectre attacks

Security Affairs

In January, white hackers from Google Project Zero disclosed the vulnerabilities that potentially impact all major CPUs, including the ones manufactured by AMD, ARM, and Intel. ARM explained that the Spectre and Meltdown vulnerabilities can be addressed by applying existing mitigations described in a previously released white paper.

Paper 268
article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

The threats that are notable for the Asian region are represented by a significant number of attacks aimed at manufacturing of chips, microprocessors and system control boards of different IT vendors, whose principal manufacturing operations are located in Asia.

Phishing 272
article thumbnail

The data-driven manufacturing revolution is underway

Information Matters

The World Economic Forum (WEF) has published a white paper making the case for manufacturing industries to ramp up their investments in data and analytics. According to the paper’s authors: Read more.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

We do white papers and thought leadership at conferences. On the operating side, whether it’s manufacturing or energy generation, or whatever, those folks are not security experts and they don’t have a connection with IT security people.” It’s membership and cross-industry driven.” OT and IT convergence.

Risk 164
article thumbnail

Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

eSecurity Planet

In a recent blog post , the researchers said the bad actors are looking to leverage a path traversal vulnerability that could affect millions of home routers and other Internet of Things (IoT) devices that use the same code base and are manufactured by at least 17 vendors. Tenable First to Disclose Flaw. ” Multiple Threats.

IoT 144