Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

Bluetooth Flaws Allow Attackers to Impersonate Legitimate Devices
Bluetooth Flaws Allow Attackers to Impersonate Legitimate Devices
Bluetooth Flaws Allow Attackers to Impersonate Legitimate Devices
Bluetooth Flaws Allow Attackers to Impersonate Legitimate Devices

Bluetooth Flaws Allow Attackers to Impersonate Legitimate Devices

Bluetooth Flaws Allow Attackers to Impersonate Legitimate Devices Attackers could abuse vulnerabilities discovered in the Bluetooth Core and Mesh Profile specifications to impersonate legitimate devices during the pairing process and launch man-in-the-middle (MitM) attacks. The Bluetooth Core and Mesh Profile specifications define requirements needed by Bluetooth devices to communicate with each other and for Bluetooth devices using low energy wireless technology to enable interoperable mesh

Indonesian Govt Blocks Access to RaidForums Hacking Forum After Data Leak

Indonesian Govt Blocks Access to RaidForums Hacking Forum After Data Leak The Indonesian government is blocking access to the RaidForums hacking forum after the alleged personal information of Indonesian citizens was posted online. On Friday, a newly registered forum member posted what they claim is a database containing 200 million records of personal information for Indonesian

North Korean Hackers Behind CryptoCore Multi-million Dollar Heists

North Korean Hackers Behind CryptoCore Multi-million Dollar Heists Security researchers piecing together evidence from multiple attacks on cryptocurrency exchanges, attributed to a threat actor they named CryptoCore have established a strong connection to the North Korean state-sponsored group Lazarus. The group is believed to have stolen hundreds of millions of U.S. dollars by breaching cryptocurrency

Zeppelin Ransomware Comes Back to Life with Updated Versions

Zeppelin Ransomware Comes Back to Life with Updated Versions The developers of Zeppelin ransomware have resumed their activity after a period of relative silence that started last Fall and started to advertise new versions of the malware. A recent variant of the malware became available on a hacker forum at the end of last month, offering

× Chat with us