🖨️ Skriv ut hvor som helst. Når som helst.
Brother bærbare skrivere = kompakte, robuste & klare for feltarbeid.
👉 Utforsk nå hos Zeproc
https://zurl.co/n9dg8
🖨️ Skriv ut hvor som helst. Når som helst.
Brother bærbare skrivere = kompakte, robuste & klare for feltarbeid.
👉 Utforsk nå hos Zeproc
https://zurl.co/n9dg8
Smartere utskrift. Raskere arbeidsdager. 🖨
Fra lasere til A3-inkjets & mobile skrivere — Brother har løsningen for ditt kontor.
👉 Kjøp Brother hos Zeproc.
1/? Called to a small office.
Two #Windows11 machines each showing two #BrotherPrinters as Offline.
But both printers are connected to the same WiFi router as the computers.
All dropped out last Thursday.
The "troubleshooting" offered by MS is on the level of drunk 20 year olds who don't give a fuck but who have been sucking on corporate-positive-doublespeak from birth.
Windows 3.1 came out 1992.
As unpleasant at times as #Linux is, this crap that #Microsoft dishes up is 10 times worse.
Millions of Brother printers are at risk due to multiple critical vulnerabilities, including one that can't be patched and lets attackers generate admin passwords if they know the serial number. Users urged to change default passwords now! 🔒🖨️ #cybersecurity #infosec #BrotherPrinters
https://www.techradar.com/pro/security/millions-of-brother-printers-threatened-by-multiple-serious-vulnerabilities-enterprise-and-home-printers-at-risk
#newz
Hundreds of Brother printer models are affected by a critical, unpatchable vulnerability (CVE-2024-51978) that allows attackers to generate the default admin password using the device’s serial number—information that’s easily discoverable via other flaws.
748 total models across Brother, Fujifilm, Ricoh, Toshiba, and Konica Minolta are impacted, with millions of devices at risk globally.
Attackers can:
• Gain unauthenticated admin access
• Pivot to full remote code execution
• Exfiltrate credentials for LDAP, FTP, and more
• Move laterally through your network
Brother says the vulnerability cannot be fixed in firmware and requires a change in manufacturing. For now, mitigation = change the default admin password immediately.
Our pentest team regularly highlights printer security as a critical path to system compromise—and today’s news is another example that underscores this risk. This is your reminder: Printers are not “set-and-forget” devices. Treat them like any other endpoint—monitor, patch, and lock them down.
Need help testing your network for exploitable print devices? Contact us and our pentest team can help!
Read the Dark Reading article for more details on the Brother Printers vulnerability: https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug
#CyberSecurity #PenetrationTesting #Pentest #Pentesting #PrinterSecurity #BrotherPrinters #CVE202451978 #Infosec #IT #SMB #CISO #Cyberaware #DFIR #ITSecurity #ZeroTrust #PatchNow #Pentest
Brother printers may be handing hackers the keys—689 models expose default admin passwords through a predictable algorithm. How safe is your device?
#brotherprinters
#defaultpasswords
#cybersecurity
#vulnerability
#infosec
I just replaced some Brother printer ink cartridges that the printer informed weren’t official but the printer accepted them and they work anyway. Low bar but yay Brother!
#BrotherPrinters #BuyBrotherPrinters #BrotherPrintersArentEvilAtLeastNotNowAnyway
Collecting this year's failures by common computer #OperatingSystems.
#Windows11 : #SystemsInformation: Can't Select and Copy from the page. #DarkAgesComputing
#Linux (multiple variants but not all) Can't do #DoubleSided printing from #BrotherPrinters and, from what I read, #HPPrinters. Could formerly do this. Progressing in wrong direction. Sustainability/#GlobalWarming?