A critical security vulnerability has been discovered in Hikvision network cameras, putting users' Dynamic DNS credentials at risk of exposure. The vulnerability affects a wide range of camera models and could allow attackers to intercept sensitive information or disrupt communication between the camera and the Dynamic DNS service. This is a serious concern, as attackers could exploit this vulnerability to steal Dynamic DNS credentials, disrupt communication, or even launch further attacks. The issue lies in older firmware versions of Hikvision network cameras, which only supported HTTP communication with Dynamic DNS providers like DynDNS and NO-IP. This meant usernames and passwords were sent in plain text, making them vulnerable to interception. With this vulnerability, attackers could capture usernames and passwords, potentially gaining unauthorized access to the user's Dynamic DNS account. Hikvision has released updated firmware versions that enforce HTTPS communication with Dynamic DNS services, effectively patching the vulnerability. To mitigate security risks, update your camera's firmware to the latest version immediately. Don't wait protect your credentials and ensure the security of your network cameras by updating your firmware today.
Researchers at Hybrid Analysis have uncovered a sophisticated two-stage malware campaign that specifically targets cryptocurrency users and browser data. The campaign uses two inte...
Palo Alto Networks discovered an Android spyware, known as Landfall, which is used in zero-day attacks against owners of Samsung devices. The malware takes advantage of a vulnerabi...
The U.S. Congressional Budget Office (CBO) has confirmed a cybersecurity incident involving unauthorized access to its internal network, reportedly by a foreign threat actor. The b...