Ponder.cat
  • Communities
  • heart
  • search
    • Login
    • Sign Up
    • Communities

    • heart
      Support Lemmy
    • search
      Search

    • Login
    • Sign Up
    TheEighthDoctor@lemmy.zip to Cybersecurity@sh.itjust.worksEnglish · 4 months ago

    Tankies of Lemmy how do you explain a Heart Monitor having a reverse backdoor with the IP of a university in China?

    www.cisa.gov

    external-link
    message-square
    10
    fedilink
    -7
    external-link

    Tankies of Lemmy how do you explain a Heart Monitor having a reverse backdoor with the IP of a university in China?

    www.cisa.gov

    TheEighthDoctor@lemmy.zip to Cybersecurity@sh.itjust.worksEnglish · 4 months ago
    message-square
    10
    fedilink
    Contec CMS8000 Contains a Backdoor | CISA
    www.cisa.gov
    external-link
    This fact sheet details an analysis of three firmware package versions of the Contec CMS8000, a patient monitor used by the U.S. Healthcare and Public Health (HPH) sector.
    • liyunxiao@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      3
      ·
      4 months ago

      Source?

    Cybersecurity@sh.itjust.works

    cybersecurity@sh.itjust.works

    Subscribe from Remote Instance

    Create a post
    You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

    c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

    THE RULES

    Instance Rules

    • Be respectful. Everyone should feel welcome here.
    • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
    • No Ads / Spamming.
    • No pornography.

    Community Rules

    • Idk, keep it semi-professional?
    • Nothing illegal. We’re all ethical here.
    • Rules will be added/redefined as necessary.

    If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

    Learn about hacking

    Hack the Box

    Try Hack Me

    Pico Capture the flag

    Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

    Notable mention to !cybersecuritymemes@lemmy.world

    Visibility: Public
    globe

    This community can be federated to other instances and be posted/commented in by their users.

    • 60 users / day
    • 510 users / week
    • 1.35K users / month
    • 4.75K users / 6 months
    • 2 local subscribers
    • 7.59K subscribers
    • 1.85K Posts
    • 2.74K Comments
    • Modlog
    • mods:
    • Kid@sh.itjust.works
    • Lanky_Pomegranate530@midwest.social
    • UI: unknown version
    • BE: 0.19.8
    • Modlog
    • Instances
    • Docs
    • Code
    • join-lemmy.org