Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Large numbers of Medical IoT Devices are Vulnerable to Attack According to Unit 42

IoT devices in general are the bane of most security teams. Typically, they lack basic security features and are complicated at best to keep patched. Much of this is due to the process needed to patch them and the rest of due to vendors being slow to push out the updated/patched images. To further complicate this, in the medical world you have the demand for 100% uptime and the ever-popular FDA exclusions that far too many vendors operate under. This usually means that on any given day Medical IoT devices are an attack surface waiting to be attacked.

Details
By Sean Kalinich
Sean Kalinich
Mar 03
Hits: 1164
  • Security
  • IoT
  • Vulnerability Management
  • healthcare
  • palo alto
  • unit 42

Read more: Large numbers of Medical IoT Devices are...

No comments on “Large numbers of Medical IoT Devices are Vulnerable to Attack According to Unit 42”
Security Talk

NVIDIA Confirms Breach as Details Show up Around what the Attackers Took

In one of the “odder” breaches that we have covered, NVIDIA has confirmed it was the victim of a breach that resulted in the loss of data. Information about the breach first crossed our paths about a week ago, but much of the information was speculation and some of the claims seemed very unusual. One of the most unusual was a claim by the alleged hacking group LAPSUS$ that NVIDIA had actually hacked them back.

Details
By Sean Kalinich
Sean Kalinich
Mar 03
Hits: 1634
  • Data Theft
  • Breach
  • Attacks
  • dlp
  • mdm

Read more: NVIDIA Confirms Breach as Details Show up Around...

No comments on “NVIDIA Confirms Breach as Details Show up Around what the Attackers Took”
Security Talk

1, 2, 3, 4… I Think I see a Hacker War. Just as Anonymous Declares Cyberwar on Russia, Conti Declares Cyberwar Back

The Russian invasion of Ukraine has given an insight into how modern warfare is carried out on a strategic level. We have seen how Russia used malware and specific cyber attacks to interrupt communications and to potentially wipe critical data. We have seen new methods to disrupt this these attacks. We have also seen a new shift in modern warfare, the rise of the cyber partisan. In typical wars commanders on both side account for local resistance and partisan groups that can have an impact on battles and logistics. These are usually small groups of armed civilians (sometimes with government support), but now they have moved behind the keyboard.

Details
By Sean Kalinich
Sean Kalinich
Mar 02
Hits: 1501
  • Anonymous
  • Malware
  • Cyberwar
  • conti
  • hacker groups

Read more: 1, 2, 3, 4… I Think I see a Hacker War. Just as...

No comments on “1, 2, 3, 4… I Think I see a Hacker War. Just as Anonymous Declares Cyberwar on Russia, Conti Declares Cyberwar Back”
Security Talk

More Banking Malware Slips by the Protections in the Google Play Store, Meet TeaBot

Banking malware for mobile devices is on the rise thanks to the ubiquitous use of mobile apps for personal financial tracking and transactions. This move was almost certain to attract threat actors like a moth to a porchlight. When given the gloriously poor state of mobile anti-malware and protection it is no wonder there are so many flavors of this popping up. What is even more disappointing, is the fact that we are seeing the malware packages pushed out through legitimate app stores.

Details
By Sean Kalinich
Sean Kalinich
Mar 02
Hits: 1085
  • Security
  • Google Play Store
  • Mobile Security
  • banking malwrae
  • teabot

Read more: More Banking Malware Slips by the Protections in...

No comments on “More Banking Malware Slips by the Protections in the Google Play Store, Meet TeaBot”
Security Talk

Microsoft Says that Reset My PC Option Does not Work as Expected Due to a Bug

It seems that Microsoft shares an issue that is a bit like one that can happen in mobile devices. When you reset your device on an Android Device and you have accounts that sync data with their own internal folders, there can be lingering information even after a reset of the device. Although not as prevalent as it once was, the advice was and still is, to remove all accounts before beginning the reset process. This is so that there is no data left behind after a reset. This same issue has popped up in Windows 10.

Details
By Sean Kalinich
Sean Kalinich
Mar 01
Hits: 1097
  • Microsoft
  • OneDrive
  • storage sense
  • file security

Read more: Microsoft Says that Reset My PC Option Does not...

No comments on “Microsoft Says that Reset My PC Option Does not Work as Expected Due to a Bug”

More Articles …

  1. Companies Prepare for Attacks as Sanctions Hit and as Russia is Blocked from SWIFT Banking System over Ukraine Invasion
  2. Malware Found in Microsoft Store Gaming Apps Could Hijack Social Media Accounts
  3. Microsoft Preps to Remove WMIC from Windows 11 and Remove an Attack Vector
  4. Vulnerabilities Disclosed in Cisco NX-OS that Could Allow Arbitrary Code Execution
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23

Page 19 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech