What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecurityWeek.webp 2019-03-23 06:02:01 Pwn2Own 2019: Researchers Win Tesla After Hacking Its Browser (lien direct) Researchers win Tesla Model 3 at Pwn2Own Tesla
SecurityWeek.webp 2019-02-26 17:42:05 NVIDIA Patches High Risk Vulnerabilities in GPU Display Drivers (lien direct) NVIDIA has released a security update for the NVIDIA GPU display driver, to address several High severity vulnerabilities impacting GeForce, Quadro, NVS, and Tesla products.  Tesla
SecurityWeek.webp 2018-08-06 17:14:01 Ex-Tesla Worker Accused of Hacking Seeks $1M in Counterclaim (lien direct) Tesla Breach Tesla ★★★★★
SecurityWeek.webp 2018-06-22 17:29:01 Tesla Breach: Malicious Insider Revenge or Whistleblowing? (lien direct) Tesla Breach Just before midnight last Sunday evening (June 17, 2018), Elon Musk sent an email to all staff. He was dismayed, he said, to learn about a Tesla employee "making direct code changes to the Tesla Manufacturing Operating System under false usernames and exporting large amounts of highly sensitive Tesla data to unknown third parties." Tesla Tesla
SecurityWeek.webp 2018-04-07 16:58:01 New Agent Tesla Spyware Variant Discovered (lien direct) A new variant of the Agent Tesla spyware has been spreading via malicious Microsoft Word documents, Fortinet reports. Tesla
SecurityWeek.webp 2018-03-20 07:03:01 Coverity Scan Hacked, Abused for Cryptocurrency Mining (lien direct) Coverity Scan, a free service used by tens of thousands of developers to find and fix bugs in their open source projects, was suspended in February after hackers breached some of its servers and abused them for cryptocurrency mining. Synopsys, which acquired Coverity in 2014, started notifying Coverity Scan users about the breach on Friday. The company said malicious actors gained access to Coverity Scan systems sometime in February. “We suspect that the access was to utilize our computing power for cryptocurrency mining,” Synopsys told users. “We have not found evidence that database files or artifacts uploaded by the open source community users of the Coverity Scan service were accessed. We retained a well-known computer forensics company to assist us in our investigation.” Synopsys says the service is now back online and it believes the point of access leveraged by the attackers has been closed. In order to regain access to Coverity Scan, users will need to reset their passwords. “Please note that the servers in question were not connected to any other Synopsys computer networks. This should have no impact on customers of our commercial products, and this event did not put any Synopsys corporate data or intellectual property at risk,” users were told. Cybercriminals have become increasingly interested in making a profit by hacking PCs and servers and abusing them to mine cryptocurrencies. Cryptocurrency mining malware can target a wide range of devices, including industrial systems. One recent high-profile victim was the carmaker Tesla, whose Kubernetes pods were compromised and used for cryptocurrency mining. According to RedLock, which discovered the breach, hackers gained access to Tesla's Kubernetes console due to the lack of password protection. Related: Avoid Becoming a Crypto-Mining Bot - Where to Look for Mining Malware and How to Respond Related: Linux Malware Targets Raspberry Pi for Cryptocurrency Mining view counter Uber Tesla
SecurityWeek.webp 2017-09-22 15:12:13 NVIDIA Patches Several Flaws in GPU Display Drivers (lien direct) NVIDIA has started releasing patches for several denial-of-service (DoS) and privilege escalation vulnerabilities affecting its GeForce, NVS, Quadro and Tesla graphics card drivers. Tesla
SecurityWeek.webp 2017-07-28 18:45:55 Tesla Model X Hacked by Chinese Experts (lien direct) Security researchers from China-based tech company Tencent have once again demonstrated that they can remotely hack a Tesla. The vulnerabilities they leveraged were quickly patched by the carmaker. Tesla
SecurityWeek.webp 2016-11-25 15:14:00 Researchers Hijack Tesla Car by Hacking Mobile App (lien direct) Researchers at Norway-based security firm Promon have demonstrated how thieves with the necessary hacking skills can track and steal Tesla vehicles through the carmaker's Android application. Tesla
SecurityWeek.webp 2016-09-20 07:54:57 Chinese Researchers Remotely Hack Tesla Model S (lien direct) Security researchers from China-based tech company Tencent have identified a series of vulnerabilities that can be exploited to remotely hack an unmodified Tesla Model S while it's parked or on the move. Tesla
Last update at: 2024-05-16 01:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter