##securityflaw
Chinese-made robot vacuums marketed with slogans like “Top-tier security,” “Safe two-way communication” and “Trust the No. 1 in protection” have been found to contain serious security flaws, according to the Korea Consumer Agency. #robotvacuum #securityflaw

buff.ly/VBFmcR9
"Top tier" security? Not quite, says KCA about Chinese robot vacuums
Even though they are marketed with slogans like “Top-tier security,” “Safe two-way communication” and “Trust the No. 1 in protection,” Chinese-made robot vacuums were found to have serious security…
koreajoongangdaily.joins.com
October 6, 2025 at 8:19 AM Everybody can reply
Neon, a call‑recording app, shut down after a security flaw let logged‑in users see others' phone numbers and recordings, reported by TechCrunch on September 25 2025. https://getnews.me/neon-call-recording-app-shuts-down-after-security-flaw-exposes-user-data/ #neon #securityflaw
September 27, 2025 at 4:58 AM Everybody can reply
Security flaw found, fixed that could have left millions of Dell laptops vulnerable, researchers say
By AJ Vicens (Reuters) -A flaw in the chips used to secure tens of millions of Dell (NYSE:DELL) laptops could have given attackers the ability to steal sensitive data as well as maintain access even after a fresh operating system install, researchers with Cisco (NASDAQ:CSCO) Talos said Tuesday. The previously unreported analysis, validated by Dell in a June security advisory, affected more than 100 models of Dell laptops, according to the company, and targeted a chip in the computer that stores passwords, biometric data and security codes, and installs fingerprint, smartcard and near-field communications drivers and firmware. There is no indication that the vulnerabilities have been exploited in the wild, according to the researchers, and Dell issued patches for the devices in March, April and May, with an overall security advisory published June 13. The vulnerabilities are specific to the Broadcom (NASDAQ:AVGO) BCM5820X chip used by Dell in its ControlVault security firmware and software. The flaw affects laptop models common in the cybersecurity industry and government settings, according to Philippe Laulheret, the senior vulnerability researcher at Cisco Talos who discovered and led the analysis. “Sensitive industries that require heightened security when logging in (via smartcard or NFC) are more likely to find ControlVault devices in their environment,” Laulheret wrote in a blog published Tuesday ahead of a presentation of the analysis at the Black Hat security conference in Las Vegas scheduled for August 6. The findings highlight the need for more security research focused on computer hardware tasked with handling biometrics and other sensitive data, said Nick Biasini, head of outreach at Cisco Talos. “These concepts of secure enclaves and using biometrics and these various other types of technologies are getting more and more widespread,” Biasini said. “It’s becoming commonplace on devices but it also introduces a new attack surface." A spokesperson for Dell said in a statement that the company addressed the issues “quickly and transparently,” and directed customers to the June 13 advisory. “As always, it is important that customers promptly apply security updates that we make available and move to supported versions of our products to ensure their systems remain secure,” the spokesperson said. Broadcom declined to comment.
www.investing.com
August 5, 2025 at 1:28 PM Everybody can reply
'ایکو لیک' نے سیکیورٹی ماہرین کو چونکا دیا،ہیکرز پالیسیز کو بائی پاس کرنے میں کامیاب ہو گئے
مزید پڑھیئے: www.aaj.tv/news/30465288
#AajNews #AISecurity #AIAgents #SecurityFlaw #cyberrisk
June 12, 2025 at 6:12 AM Everybody can reply
6/12 "The core problem is that older systems never proved distance..." - H8crilA. Older systems only proved connectivity, making them vulnerable to relay attacks. #securityflaw #relayattack #carhacking
April 27, 2025 at 12:29 PM Everybody can reply
WinRAR Bug Circumvents Windows Mark of Web Security Notifications. #MarkoftheWeb #Securityflaw #Symlink
WinRAR Bug Circumvents Windows Mark of Web Security Notifications.
 A security flaw in the WinRAR file archiver solution might be used to circumvent the Mark of the Web (MotW) security warning and execute arbitrary code on a Windows computer. The vulnerability is known as CVE-2025-31334 and impacts all WinRAR versions except the most recent release, 7.11.  Mark of the Web is a security mechanism in Windows that uses a metadata value (an additional data stream called 'zone-identifier') to identify potentially dangerous files downloaded from the internet. When you launch an executable with the MotW tag, Windows informs you that it was obtained from the internet and can be risky, and you can choose whether to continue or terminate it. Symlink to executable The CVE-2025-31334 flaw allows an attacker to circumvent the MotW security warning when opening a symbolic link (symlink) to an executable file in any WinRAR version prior to 7.11. Using a specially designed symbolic link, an attacker can execute arbitrary code. It should be noted that on Windows, symlinks can only be generated with administrator privileges.  The security flaw received a medium severity score of 6.8 and was fixed in the latest version of WinRAR, according to the applications change log: “If symlink pointing at an executable was started from WinRAR shell, the executable Mark of the Web data was ignored” - WinRaR.  Shimamine Taihei of Mitsui Bussan Secure Directions reported the vulnerability to the Information Technology Promotion Agency (IPA) in Japan. The responsible disclosure was organised by Japan's Computer Security Incident Response Team with the developer of WinRAR. Starting with version 7.10, WinRAR allows you to remove information from the MotW alternative data stream (such as location and IP address) that could be deemed a privacy issue. Cybercriminals, including state-sponsored ones, have previously used MotW bypasses to transmit malware without triggering the security warning.  Recently, Russian attackers exploited a vulnerability in the 7-Zip archiver that did not propagate the MotW when double archiving (archiving one file within another) to launch the Smokeloader malware dropper.
dlvr.it
April 12, 2025 at 3:06 PM Everybody can reply
Noticed an unexpected 'inetpub' folder on your Windows PC? Microsoft’s latest update is creating it to tackle a serious security flaw. Curious how a routine update turned into a security mystery?

#inetpub
#windowsupdate
#securityflaw
#microsoft
#cve202521204
Understanding the 'inetpub' Folder: A Security Update Mystery | The DefendOps Diaries
Explore the mystery of the 'inetpub' folder's appearance after a Windows security update and its security implications.
thedefendopsdiaries.com
April 11, 2025 at 2:41 PM Everybody can reply
WinRAR security flaw ignores Windows Mark of the Web security warnings #Technology #Potatosecurity #WinRAR #SecurityFlaw #MarkOfTheWeb
April 6, 2025 at 6:00 PM Everybody can reply
February 5, 2025 at 5:42 PM Everybody can reply
1 likes
#SecurityFlaw #Microsoft #USA #CybersecurityNews New vulnerability CVE-2024-7344 in UEFI Secure Boot exposes systems to bootkit attacks, compromising Microsoft-signed applications. Patch is crucial to mi... https://www.hendryadrian.com/new-uefi-secure-boot-flaw-exposes-systems-to-bootkits-patch-now/
January 16, 2025 at 3:34 PM Everybody can reply