Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks.
"Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during
Top News
-
Tenable Acquires Eureka Security To Provide Data Security Across Infrastructure
Tenable® Holdings, Inc., a leading Exposure Management company, has announced a definitive agreement to acquire Eureka Security, Inc., a prominent...
-
SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the country with a malware called...
-
FBI thu giữ 7.000 khóa giải mã LockBit, sẵn sàng hỗ trợ nạn nhân ransomware
FBI kêu gọi nạn nhân trong các vụ tấn công mã độc đòi tiền chuộc (ransomware) của LockBit lên tiếng sau khi tiết lộ đã thu hơn 7.000 khóa giải...