Aggregator
Winner, Name that Ware December 2024
Руководство по инсайдерским атакам 40-х годов неожиданно отразило офисные будни
CISA Releases Fact Sheet Detailing Embedded Backdoor Function of Contec CMS8000 Firmware
CISA released a fact sheet, Contec CMS8000 Contains a Backdoor, detailing an analysis of three firmware package versions of the Contec CMS8000, a patient monitor used by the U.S. Healthcare and Public Health (HPH) sector. Analysts discovered that an embedded backdoor function with a hard-coded IP address, CWE – 912: Hidden Functionality (CVE-2025-0626), and functionality that enables patient data spillage, CWE – 359: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2025-0683), exists in all versions analyzed.
Please note the Contec CMS8000 may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA’s safety communication, Cybersecurity Vulnerabilities with Certain Patient Monitors from Contec and Epsimed: FDA Safety Communication.
Contec Medical Systems, the company which manufactures this monitor as well as other medical device and healthcare solutions, is headquartered in Qinhuangdao, China. The Contec CMS8000 is used in medical settings across the U.S. and European Union to provide continuous monitoring of a patient’s vital signs—tracking electrocardiogram, heart rate, blood oxygen saturation, non-invasive blood pressure, temperature, and respiration rate. CISA assesses that inclusion of this backdoor in the firmware of the patient monitor can create conditions which may allow remote code execution and device modification with the ability to alter its configuration. This introduces risk to patient safety as a malfunctioning patient monitor could lead to an improper response to patient vital signs.
CISA strongly urges HPH sector organizations review the fact sheet and implement FDA's mitigations. Visit CISA’s Healthcare and Public Health Cybersecurity page to learn more about how to help improve cybersecurity within the HPH sector. For more information and guidance on protection against the most common and impactful threats, tactics, techniques, and procedures, visit CISA’s Cross-Sector Cybersecurity Performance Goals.
CISA Releases Eight Industrial Control Systems Advisories
CISA released eight Industrial Control Systems (ICS) advisories on January 30, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-030-01 Hitachi Energy UNEM
- ICSA-25-030-02 New Rock Technologies Cloud Connected Devices
- ICSA-25-030-03 Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs
- ICSA-25-030-04 Rockwell Automation KEPServer
- ICSA-25-030-05 Rockwell Automation FactoryTalk AssetCentre
- ICSMA-25-030-01 Contec Health CMS8000 Patient Monitor
- ICSA-24-135-04 Mitsubishi Electric Multiple FA Engineering Software Products (Update B)
- ICSMA-22-244-01 Contec Health CMS8000 Patient Monitor (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
Time Bandit ChatGPT jailbreak bypasses safeguards on sensitive topics
Ransomware Attack Disrupts Blood Donation Services in US
TikTok’s Project Clover Evolves With PETs, Data Access Controls
The popular and controversial Chinese social media app TikTok is pushing forward with Project Clover, a €12 billion, 10-year initiative aimed at bolstering the protection of European user data.
The post TikTok’s Project Clover Evolves With PETs, Data Access Controls appeared first on Security Boulevard.
TikTok’s Project Clover Evolves With PETs, Data Access Controls
安全运营之浅谈SIEM的规则优化(一)
Реклама-шпион: Amazon тайно собирает цифровой дневник пользователей
This month in security with Tony Anscombe – January 2025 edition
Lynx
Lynx
Tria Stealer Malware Exploits Android Devices to Harvest SMS Data
Cybersecurity researchers have uncovered a sophisticated Android malware campaign known as “Tria Stealer,” which is targeting users in Malaysia and Brunei to collect sensitive information such as SMS data, call logs, WhatsApp messages, and emails. The malware campaign, which has been active since March 2024, uses wedding invitations as a lure to trick victims into […]
The post Tria Stealer Malware Exploits Android Devices to Harvest SMS Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.