Serious flaw discovered in thermal security cameras

It has been reported that there are secret hard-coded accounts in thermal security cameras manufactured by FLIR Systems, Inc., one of the largest vendor of such products. Depending on the FLIR camera version, the following username-password combos will grant an attacker access over the device.

http://brn.firetrench.com

http://sarn.firetrench.com

http://adn.firetrench.com

Continue reading

Medical data of 150,000 patients exposed!

Security researchers have discovered that over 47GB worth of sensitive medical records belonging to an estimated 150,000 Americans were inadvertently left exposed in an unsecured Amazon server. Kromtech Security Researchers said the exposed documents were associated with healthcare firm Patient Home Monitoring (PHM), which provides in-home monitoring and disease management services for patients in the US.

http://brn.firetrench.com

Continue reading

Hyatt Hotels suffer a second data breach in as many years

Hyatt is alerting customers about another credit card breach at some of its hotels – 41 hotels in 11 countries. This is the second major incident with the hospitality chain in as many years. Hyatt said its cybersecurity team discovered signs of unauthorised access to payment card information from cards manually entered or swiped at the front desk of certain Hyatt-managed locations between March 18, 2017 and July 2, 2017.

http://brn.firetrench.com

Continue reading

Banks, Cryptocurrency Exchanges and Critical Infrastructure are Forecast to be the Most Likely Targets for Hacking in the Near Future

MOSCOW, October 12, 2017 /PRNewswire/ —

  1. In the next year, the main point of losses for banks from cyber-attacks will be not theft of money, but destruction of their IT infrastructure during the final stages of a targeted hacking attack.Banks used to only be attacked by cybercriminals. Today, state-linked hackers are doing this far more frequently. By destroying IT infrastructure, cybercriminals will attempt to cover their tracks during thefts, while the aim of state-sponsored hackers will be to maximize the damage to banks and discontinue banking operations. In both cases, the damage done to banks may be even greater than the amount of funds stolen due to service interruptions and resulting reputational and regulatory impact.

http://brn.firetrench.com
Continue reading