all InfoSec news
Topic: ble
Securing Bluetooth Low Energy: A Literature Review
2 weeks, 6 days ago |
arxiv.org
Comparing React Native BLE libraries
2 months, 1 week ago |
dev.to
Maxima Max Pro Power BLE Traffic Replay
2 months, 1 week ago |
www.exploitalert.com
NetAlly launches CyberScope® Air Wi-Fi Vulnerability Scanner & Tester
2 months, 1 week ago |
ai-techpark.com
[remote] Maxima Max Pro Power - BLE Traffic Replay (Unauthenticated)
2 months, 2 weeks ago |
www.exploit-db.com
Malware In Strange Places, Overheating, LockBit - PSW #818
2 months, 2 weeks ago |
www.youtube.com
Hacking BLE to Liberate Your Exercise Equipment
4 months, 2 weeks ago |
hackaday.com
AppleJuice BLE Hack: Spamming Apple Devices with a Raspberry Pi Pico W!
7 months, 1 week ago |
www.youtube.com
CVE-2023-30698 (android)
9 months, 1 week ago |
web.nvd.nist.gov
CVE-2023-33383 (pro_4pm_firmware)
9 months, 2 weeks ago |
web.nvd.nist.gov
CVE-2023-34625 (mojobox_firmware)
9 months, 4 weeks ago |
web.nvd.nist.gov
MojoBox BLE Replay Attack
9 months, 4 weeks ago |
packetstormsecurity.com
CVE-2023-34761 (hello_cup)
10 months, 2 weeks ago |
web.nvd.nist.gov
CVE-2023-28116 (contiki-ng)
1 year, 2 months ago |
web.nvd.nist.gov
CVE-2023-21423 (android)
1 year, 3 months ago |
web.nvd.nist.gov
CVE-2022-45192 (rn4870_firmware)
1 year, 3 months ago |
web.nvd.nist.gov
CVE-2022-45191 (rn4870_firmware)
1 year, 3 months ago |
web.nvd.nist.gov
CVE-2023-23609 (contiki-ng)
1 year, 3 months ago |
web.nvd.nist.gov
Mobile Bug Bounty Hunting? Enter BLE – Cybervelia
1 year, 5 months ago |
www.reddit.com
How iPhones can run malware even when they’re off
1 year, 11 months ago |
blog.malwarebytes.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
Securing Bluetooth Low Energy: A Literature Review
2 weeks, 6 days ago |
arxiv.org
Comparing React Native BLE libraries
2 months, 1 week ago |
dev.to
Maxima Max Pro Power BLE Traffic Replay
2 months, 1 week ago |
www.exploitalert.com
NetAlly launches CyberScope® Air Wi-Fi Vulnerability Scanner & Tester
2 months, 1 week ago |
ai-techpark.com
[remote] Maxima Max Pro Power - BLE Traffic Replay (Unauthenticated)
2 months, 2 weeks ago |
www.exploit-db.com
Malware In Strange Places, Overheating, LockBit - PSW #818
2 months, 2 weeks ago |
www.youtube.com
Hacking BLE to Liberate Your Exercise Equipment
4 months, 2 weeks ago |
hackaday.com
AppleJuice BLE Hack: Spamming Apple Devices with a Raspberry Pi Pico W!
7 months, 1 week ago |
www.youtube.com
CVE-2023-30698 (android)
9 months, 1 week ago |
web.nvd.nist.gov
CVE-2023-33383 (pro_4pm_firmware)
9 months, 2 weeks ago |
web.nvd.nist.gov
CVE-2023-34625 (mojobox_firmware)
9 months, 4 weeks ago |
web.nvd.nist.gov
MojoBox BLE Replay Attack
9 months, 4 weeks ago |
packetstormsecurity.com
CVE-2023-34761 (hello_cup)
10 months, 2 weeks ago |
web.nvd.nist.gov
CVE-2023-28116 (contiki-ng)
1 year, 2 months ago |
web.nvd.nist.gov
CVE-2023-21423 (android)
1 year, 3 months ago |
web.nvd.nist.gov
CVE-2022-45192 (rn4870_firmware)
1 year, 3 months ago |
web.nvd.nist.gov
CVE-2022-45191 (rn4870_firmware)
1 year, 3 months ago |
web.nvd.nist.gov
CVE-2023-23609 (contiki-ng)
1 year, 3 months ago |
web.nvd.nist.gov
Mobile Bug Bounty Hunting? Enter BLE – Cybervelia
1 year, 5 months ago |
www.reddit.com
How iPhones can run malware even when they’re off
1 year, 11 months ago |
blog.malwarebytes.com
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Technical Support Specialist (Cyber Security)
@ Sigma Software | Warsaw, Poland
OT Security Specialist
@ Adani Group | AHMEDABAD, GUJARAT, India
FS-EGRC-Manager-Cloud Security
@ EY | Bengaluru, KA, IN, 560048