31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

Submitted by Amy Karns on

RTAS is a top-tier conference with a focus on systems with timing requirements. RTAS’25 welcomes papers describing applications, case studies, methodologies, tools, algorithms or operating systems, middleware or hardware innovations that contribute to the state of the art in the design, implementation, validation, verification, and evolution of systems with timing requirements.

"Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug"

"Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug"

Independent security researchers found a flaw in a web portal operated by the carmaker Kia that allowed them to track millions of cars, unlock doors, and start engines. The flaw discovered in the web portal enabled them to reassign control of most modern Kia vehicles' Internet-connected features, from the car owner's smartphone to their own phone or computer.

Submitted by Gregory Rigby on

"Python-Based Malware Slithers Into Systems via Legit VS Code"

"Python-Based Malware Slithers Into Systems via Legit VS Code"

"Mustang Panda," a Chinese Advanced Persistent Threat (APT) group, is suspected of being behind an ongoing sophisticated cyber espionage campaign. It involves malicious emails, and the use of Visual Studio Code (VS Code) to spread Python-based malware, which gives attackers persistent remote access to infected machines. The Cyble Research and Intelligence Lab (CRIL) discovered the campaign spreading a .lnk file posing as a legitimate setup file to download a Python distribution package. It is actually used to run a malicious Python script.

Submitted by Gregory Rigby on

"After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks"

"After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks"

Researchers at Akamai have found that the Common UNIX Printing System (CUPS) could be abused for large Distributed Denial-of-Service (DDoS) attacks following researcher Simone Margaritelli's warning regarding the system being vulnerable to unauthenticated Remote Code Execution (RCE). CUPS is an open source printing system based on the Internet Printing Protocol (IPP). It is mainly for Linux and UNIX-like operating systems. Margaritelli recently disclosed several unpatched CUPS vulnerabilities that, when chained together, can lead to RCE.

Submitted by Gregory Rigby on

"ACSC and CISA Launch Critical OT Cybersecurity Guidelines"

"ACSC and CISA Launch Critical OT Cybersecurity Guidelines"

The Australian Cyber Security Centre (ACSC) has released a new guide titled "Principles of Operational Technology Cybersecurity" in collaboration with US Cybersecurity and Infrastructure Security Agency (CISA) and international partners. The guide contains information for organizations looking to secure their Operational Technology (OT) environments in the critical infrastructure sectors. It delves into fundamental principles such as safety, data protection, network segmentation, and others to help organizations manage risks and protect against cyber threats their OT systems face.

Submitted by Gregory Rigby on

"Stonefly Group Targets US Firms With New Malware Tools"

"Stonefly Group Targets US Firms With New Malware Tools"

According to security researchers at Symantec, despite a recent indictment, the North Korean Stonefly group, also known by aliases such as APT45 and Silent Chollima, has been observed continuing its financially motivated cyberattacks against US organizations.  The researchers noted that the group, linked to North Korea’s Reconnaissance General Bureau, has shifted its focus from espionage to targeting private companies in sectors with little intelligence value.

Submitted by Adam Ekwall on

"DrayTek Fixed Critical Flaws in Over 700,000 Exposed Routers"

"DrayTek Fixed Critical Flaws in Over 700,000 Exposed Routers"

DrayTek has recently released security updates for multiple router models to address 14 vulnerabilities of varying severity, including a remote code execution flaw that received the maximum CVSS score of 10.  DrayTek noted that the flaws impact actively supported and models that have reached end-of-life.  Due to the severity, DrayTek has provided fixes for routers in both categories.  According to Vedere Labs, 785,000 DrayTek routers might be vulnerable to the newly discovered set of flaws, with 704,500 having their web interface exposed to the internet.

Submitted by Adam Ekwall on

"Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps"

"Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps"

Cloudflare recently mitigated another record-breaking DDoS attack.  The company says the attack peaked at 3.8 terabits per second (Tbps) and 2.14 billion packets per second (Pps).  The attack was aimed at an unidentified customer of an unnamed hosting provider that uses Cloudflare services.  The previous volumetric DDoS record was set in late 2021 when Microsoft saw an attack that peaked at 3.47 Tbps and a packet rate of 340 million Pps.

Submitted by Adam Ekwall on

"80% of Manufacturing Firms Have Critical Vulnerabilities"

"80% of Manufacturing Firms Have Critical Vulnerabilities"

According to security researchers at Black Kite, the manufacturing sector is at high risk of cyberattacks, with 80% of companies having critical vulnerabilities (with a CVSS score of 8 and above).  The researchers noted that over two-thirds (67%) of manufacturing organizations had at least one vulnerability from the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog, which details flaws that have been exploited in the wild.

Submitted by Adam Ekwall on

"British Hacker Charged in the US For $3.75m Insider Trading Scheme"

"British Hacker Charged in the US For $3.75m Insider Trading Scheme"

A British hacker accused of orchestrating a $3.75m insider trading scheme has recently been charged in the US.  Robert Westbrook, 39, allegedly gained unauthorized access to corporate executives’ email accounts to profit from confidential financial information.  According to the Department of Justice (DoJ), between January 2019 and May 2020, Westbrook hacked into the Microsoft Office 365 accounts of executives at five US companies.

Submitted by Adam Ekwall on
Subscribe to