A critical security vulnerability has been discovered in Hikvision network cameras, putting users' Dynamic DNS credentials at risk of exposure. The vulnerability affects a wide range of camera models and could allow attackers to intercept sensitive information or disrupt communication between the camera and the Dynamic DNS service. This is a serious concern, as attackers could exploit this vulnerability to steal Dynamic DNS credentials, disrupt communication, or even launch further attacks. The issue lies in older firmware versions of Hikvision network cameras, which only supported HTTP communication with Dynamic DNS providers like DynDNS and NO-IP. This meant usernames and passwords were sent in plain text, making them vulnerable to interception. With this vulnerability, attackers could capture usernames and passwords, potentially gaining unauthorized access to the user's Dynamic DNS account. Hikvision has released updated firmware versions that enforce HTTPS communication with Dynamic DNS services, effectively patching the vulnerability. To mitigate security risks, update your camera's firmware to the latest version immediately. Don't wait protect your credentials and ensure the security of your network cameras by updating your firmware today.
A buffer overflow vulnerability, critical in nature, has been encountered in the Net-SNMP trap daemon, snmptrapd. This kind of issue allows remote attackers to crash the service by...
A newly identified security flaw in Somalia’s electronic visa (e-visa) platform has raised serious concerns about the protection of traveler data. Investigations confirmed that t...
Shinhan Card, a major South Korea–based financial services provider, has confirmed a data breach that exposed personal information belonging to approximately 192,000 card merchan...