A critical security vulnerability has been discovered in Hikvision network cameras, putting users' Dynamic DNS credentials at risk of exposure. The vulnerability affects a wide range of camera models and could allow attackers to intercept sensitive information or disrupt communication between the camera and the Dynamic DNS service. This is a serious concern, as attackers could exploit this vulnerability to steal Dynamic DNS credentials, disrupt communication, or even launch further attacks. The issue lies in older firmware versions of Hikvision network cameras, which only supported HTTP communication with Dynamic DNS providers like DynDNS and NO-IP. This meant usernames and passwords were sent in plain text, making them vulnerable to interception. With this vulnerability, attackers could capture usernames and passwords, potentially gaining unauthorized access to the user's Dynamic DNS account. Hikvision has released updated firmware versions that enforce HTTPS communication with Dynamic DNS services, effectively patching the vulnerability. To mitigate security risks, update your camera's firmware to the latest version immediately. Don't wait protect your credentials and ensure the security of your network cameras by updating your firmware today.
CERT-UA has reported a large-scale phishing campaign in which threat actors impersonated the agency to distribute a remote access trojan (RAT) known as AGEWHEEZE. The campaign, att...
A critical vulnerability identified as CVE-2026-33026 affects the backup and restore functionality of nginx-ui, exposing systems to severe security risks. This flaw enables attacke...
Microsoft has identified a new malware campaign that distributes malicious Visual Basic Script (VBS) files through WhatsApp messages, targeting Windows users. The campaign relies h...