#bluetoothvulnerabilities результаты поиска

PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution dlvr.it/TMPRhH #Cybersecurity #BluetoothVulnerabilities #RemoteCodeExecution #OpenSynergy #PerfektBlue

blueteamsec1's tweet image. PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution dlvr.it/TMPRhH #Cybersecurity #BluetoothVulnerabilities #RemoteCodeExecution #OpenSynergy #PerfektBlue

Spanish researchers found 29 undocumented Bluetooth commands in the ESP32 microchip, endangering 1 billion devices with risks like impersonation and unauthorized access. #Spain #IoTSecurity #BluetoothVulnerabilities link: ift.tt/b5xpadV

TweetThreatNews's tweet image. Spanish researchers found 29 undocumented Bluetooth commands in the ESP32 microchip, endangering 1 billion devices with risks like impersonation and unauthorized access. #Spain #IoTSecurity #BluetoothVulnerabilities

link: ift.tt/b5xpadV

🚗 Bluetooth flaws dubbed "PerfektBlue" impact Mercedes, Volkswagen, and Skoda vehicles—potentially exposing drivers to remote attacks. Patch and protect your ride. #CarSecurity #BluetoothVulnerabilities 🔧📡 buff.ly/lIoH9ki


Ecovacs robot vacuums have severe Bluetooth vulnerabilities that let hackers remotely spy on users and propagate attacks to other devices. #RobotVacuums #BluetoothVulnerabilities #Hacking haywaa.com/article/ecovac…

haywaa.com

- Haywaa

- Haywaa


hackernoon: "How to Hack Bluetooth Devices: 5 Common Vulnerabilities" hackernoon.com/how-to-hack-bl… #bluetooth #bluetoothvulnerabilities


PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution dlvr.it/TMPRhH #Cybersecurity #BluetoothVulnerabilities #RemoteCodeExecution #OpenSynergy #PerfektBlue

blueteamsec1's tweet image. PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution dlvr.it/TMPRhH #Cybersecurity #BluetoothVulnerabilities #RemoteCodeExecution #OpenSynergy #PerfektBlue

🚗 Bluetooth flaws dubbed "PerfektBlue" impact Mercedes, Volkswagen, and Skoda vehicles—potentially exposing drivers to remote attacks. Patch and protect your ride. #CarSecurity #BluetoothVulnerabilities 🔧📡 buff.ly/lIoH9ki


Spanish researchers found 29 undocumented Bluetooth commands in the ESP32 microchip, endangering 1 billion devices with risks like impersonation and unauthorized access. #Spain #IoTSecurity #BluetoothVulnerabilities link: ift.tt/b5xpadV

TweetThreatNews's tweet image. Spanish researchers found 29 undocumented Bluetooth commands in the ESP32 microchip, endangering 1 billion devices with risks like impersonation and unauthorized access. #Spain #IoTSecurity #BluetoothVulnerabilities

link: ift.tt/b5xpadV

Ecovacs robot vacuums have severe Bluetooth vulnerabilities that let hackers remotely spy on users and propagate attacks to other devices. #RobotVacuums #BluetoothVulnerabilities #Hacking haywaa.com/article/ecovac…

haywaa.com

- Haywaa

- Haywaa


hackernoon: "How to Hack Bluetooth Devices: 5 Common Vulnerabilities" hackernoon.com/how-to-hack-bl… #bluetooth #bluetoothvulnerabilities


hackernoon: "How to Hack Bluetooth Devices: 5 Common Vulnerabilities" hackernoon.com/how-to-hack-bl… #bluetooth #bluetoothvulnerabilities


Нет результатов для «#bluetoothvulnerabilities»

🔍Can you find the vuln? (This was from a 2024 exploit.)

0x158_'s tweet image. 🔍Can you find the vuln?
(This was from a 2024 exploit.)

#threatreport #HighCompleteness Lumma Stealer A Proliferating Threat in the Cybercrime Landscape | 27-07-2025 Source: medium.com/@raghavtiresea… Key details below ↓ 🧑‍💻Actors/Campaigns: Shamel Storm-2477 Sticky_werewolf 0ktapus 💀Threats: Lumma_stealer, Zeus,…

rst_cloud's tweet image. #threatreport #HighCompleteness
Lumma Stealer A Proliferating Threat in the Cybercrime Landscape | 27-07-2025
Source: medium.com/@raghavtiresea…
Key details below ↓

🧑‍💻Actors/Campaigns:
Shamel
Storm-2477
Sticky_werewolf
0ktapus

💀Threats:
Lumma_stealer, Zeus,…

[CVE-2025-9265: CRITICAL] Critical cybersecurity alert: Kiloview NDI N30 device vulnerability could grant unauthorized access. Update firmware to version 2.02.0246 to fix this issue. #cybersecurity#cve,CVE-2025-9265,#cybersecurity cvefind.com/CVE-2025-9265

CveFindCom's tweet image. [CVE-2025-9265: CRITICAL] Critical cybersecurity alert: Kiloview NDI N30 device vulnerability could grant unauthorized access. Update firmware to version 2.02.0246 to fix this issue. #cybersecurity#cve,CVE-2025-9265,#cybersecurity cvefind.com/CVE-2025-9265

A popular NPM package got compromised, attackers updated it to run a post-install script that steals secrets But the script is a *prompt* run by the user's installation of Claude Code. This avoids it being detected by tools that analyze code for malware You just got vibepwned

zack_overflow's tweet image. A popular NPM package got compromised, attackers updated it to run a post-install script that steals secrets

But the script is a *prompt* run by the user's installation of Claude Code. This avoids it being detected by tools that analyze code for malware

You just got vibepwned

Learning Bluetooth Hackery with BLE CTF : hackgnar.com/2018/06/learni…

binitamshah's tweet image. Learning Bluetooth Hackery with BLE CTF :  hackgnar.com/2018/06/learni…

Discovered 600+ #Bluetooth devices at the airport. Wonder how many of them are patched against Bluetooth pairing vulnerability that leads to 0-click RCE (CVE-2023-45866) #BlueDucky mobile-hacker.com/2024/03/26/blu…

androidmalware2's tweet image. Discovered 600+ #Bluetooth devices at the airport. Wonder how many of them are patched against Bluetooth pairing vulnerability that leads to 0-click RCE (CVE-2023-45866) #BlueDucky 
mobile-hacker.com/2024/03/26/blu…

The Practical Guide to Hacking Bluetooth Low Energy #BLE blog.attify.com/the-practical-…

cn0xroot's tweet image. The Practical Guide to Hacking Bluetooth Low Energy #BLE blog.attify.com/the-practical-…
cn0xroot's tweet image. The Practical Guide to Hacking Bluetooth Low Energy #BLE blog.attify.com/the-practical-…

[CVE-2025-8915: HIGH] Hardcoded TLS private key and certificate in firmware in Kiloview N30 2.02.246 allows malicious adversary to do a Mann-in-the-middle attack via the network#cve,CVE-2025-8915,#cybersecurity cvefind.com/CVE-2025-8915

CveFindCom's tweet image. [CVE-2025-8915: HIGH] Hardcoded TLS private key and certificate in firmware in Kiloview N30 2.02.246 allows malicious adversary to do a Mann-in-the-middle attack via the network#cve,CVE-2025-8915,#cybersecurity cvefind.com/CVE-2025-8915

Hi, My Name is Keyboard This repository contains proof-of-concept scripts for CVE-2023-45866, CVE-2024-21306, and CVE-2024-0230 Bluetooth vulnerabilities in Android, Linux, macOS, iOS and #Windows can be exploited to pair an emulated Bluetooth keyboard and inject keystrokes…

hack_git's tweet image. Hi, My Name is Keyboard

This repository contains proof-of-concept scripts for CVE-2023-45866, CVE-2024-21306, and CVE-2024-0230 Bluetooth vulnerabilities in Android, Linux, macOS, iOS and #Windows can be exploited to pair an emulated Bluetooth keyboard and inject keystrokes…
hack_git's tweet image. Hi, My Name is Keyboard

This repository contains proof-of-concept scripts for CVE-2023-45866, CVE-2024-21306, and CVE-2024-0230 Bluetooth vulnerabilities in Android, Linux, macOS, iOS and #Windows can be exploited to pair an emulated Bluetooth keyboard and inject keystrokes…

If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin) Active Bluetooth BR/EDR Sniffer/Injector: github.com/Matheus-Garbel… #bluetooth #esp32 #espressif #hacking #infosec

0xor0ne's tweet image. If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin)

Active Bluetooth BR/EDR Sniffer/Injector: github.com/Matheus-Garbel…

#bluetooth #esp32 #espressif #hacking #infosec
0xor0ne's tweet image. If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin)

Active Bluetooth BR/EDR Sniffer/Injector: github.com/Matheus-Garbel…

#bluetooth #esp32 #espressif #hacking #infosec
0xor0ne's tweet image. If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin)

Active Bluetooth BR/EDR Sniffer/Injector: github.com/Matheus-Garbel…

#bluetooth #esp32 #espressif #hacking #infosec
0xor0ne's tweet image. If you're interested in bluetooth low level hacking take a look at this cool project by Matheus Eduardo Garbelini (@MatheusGarbelin)

Active Bluetooth BR/EDR Sniffer/Injector: github.com/Matheus-Garbel…

#bluetooth #esp32 #espressif #hacking #infosec

Bluetooth vulnerabilities in Android, Linux, macOS, iOS and Windows can be exploited to pair an emulated bluetooth keyboard and inject keystrokes without user confirmation : github.com/skysafe/reblog… credits @marcnewlin Slides : github.com/marcnewlin/hi_… CVE's : CVE-2024-0230…

binitamshah's tweet image. Bluetooth vulnerabilities in Android, Linux, macOS, iOS and Windows can be exploited to pair an emulated bluetooth keyboard and inject keystrokes without user confirmation : github.com/skysafe/reblog…  credits @marcnewlin 

Slides : github.com/marcnewlin/hi_… 

CVE's : 

CVE-2024-0230…

🔥 BLURtooth (CVE-2020-15802) A new unpatched #Bluetooth pairing vulnerability could let attackers bypass authentication and easily target vulnerable nearby devices. Read details — thehackernews.com/2020/09/new-bl… #infosec #cybersecurity #tech

TheHackersNews's tweet image. 🔥 BLURtooth (CVE-2020-15802)

A new unpatched #Bluetooth pairing vulnerability could let attackers bypass authentication and easily target vulnerable nearby devices.

Read details — thehackernews.com/2020/09/new-bl…

#infosec #cybersecurity #tech

🔍 Bluetooth Security Awareness: Understanding Mobile Device Vulnerabilities 🛡️ 📱 🔐

_0b1d1's tweet image. 🔍 Bluetooth Security Awareness: Understanding Mobile Device Vulnerabilities 🛡️ 📱 🔐

SweynTooth vulerabilities family. Cool reading for anyone interested in Bluetooth security and hacking. White paper: asset-group.github.io/disclosures/sw… PoCs: github.com/Matheus-Garbel… Vuln site: asset-group.github.io/disclosures/sw… #infosec #wireless #bluetooth #cybersecurity

0xor0ne's tweet image. SweynTooth vulerabilities family.
Cool reading for anyone interested in Bluetooth security and hacking.

White paper: asset-group.github.io/disclosures/sw…
PoCs: github.com/Matheus-Garbel…
Vuln site: asset-group.github.io/disclosures/sw…

#infosec #wireless #bluetooth  #cybersecurity
0xor0ne's tweet image. SweynTooth vulerabilities family.
Cool reading for anyone interested in Bluetooth security and hacking.

White paper: asset-group.github.io/disclosures/sw…
PoCs: github.com/Matheus-Garbel…
Vuln site: asset-group.github.io/disclosures/sw…

#infosec #wireless #bluetooth  #cybersecurity
0xor0ne's tweet image. SweynTooth vulerabilities family.
Cool reading for anyone interested in Bluetooth security and hacking.

White paper: asset-group.github.io/disclosures/sw…
PoCs: github.com/Matheus-Garbel…
Vuln site: asset-group.github.io/disclosures/sw…

#infosec #wireless #bluetooth  #cybersecurity
0xor0ne's tweet image. SweynTooth vulerabilities family.
Cool reading for anyone interested in Bluetooth security and hacking.

White paper: asset-group.github.io/disclosures/sw…
PoCs: github.com/Matheus-Garbel…
Vuln site: asset-group.github.io/disclosures/sw…

#infosec #wireless #bluetooth  #cybersecurity

Hackers just turned GitHub into their command center. When police take down their servers, the malware just… reboots itself from GitHub. The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design. Read how it works →…

TheHackersNews's tweet image. Hackers just turned GitHub into their command center.

When police take down their servers, the malware just… reboots itself from GitHub.

The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.

Read how it works →…

Loading...

Something went wrong.


Something went wrong.


United States Trends