➀ A 5-year-old vulnerability in AVTECH's network cameras has been exploited to inject a Mirai variant known as Corona Mirai. ➁ The vulnerability, CVE-2024-7029, allows remote code execution and command injection with a CVSS score of 8.7. ➂ Despite being known since 2019, the vulnerability remains unpatched, and the Mirai variant has been active since at least December 2023.
Related Articles
- 29% CAGR 2025-30 for hyperscaler enterprise software sales19 days ago
- CHIIPS #18 – Chip design insights from Ras Attale of Tessent Embedded Analytics20 days ago
- Ed Eyes Up The ID Card Contract21 days ago
- Zscaler: Unstoppable Momentum As ARR Builds22 days ago
- High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech24 days ago
- Wi-Fi signals can now create accurate images of a room with the help of pre-trained AI — 'LatentCSI' leverages Stable Diffusion 3 to turn Wi-Fi data into a digital paintbrush25 days ago
- Undersea cable attacks drive sea drone development — Stark's Vanta unmanned vessels could be an affordable solution to protecting vital infrastructure25 days ago
- Conference AI & We: Leveraging Strengths, Securing Trust, Preserving Sovereignty25 days ago
- IoT Gateways: A Layer Between IoT Devices And Cloud26 days ago
- DJI fervently rejects Chinese Military Company designation following court ruling — drone maker says it 'is not controlled by the government and has no ties to the military'26 days ago