Printers are often the first foothold for attackers. From hijacking email accounts to stealing scanned documents, these overlooked devices can open the door to your entire network.

In this quick video, Sherri Davidoff and Matt Durrin explore why printers are such an attractive target, and what policies and protections your business should put in place: https://www.youtube.com/watch?v=a2R0ZUE9dR0

#PrinterSecurity #Cybersecurity #PenTesting #DataProtection

Printer Cybersecurity: Practical Prevention and Risk Reduction Tactics

YouTube
📢 Hands-On Apple 189: Brother printer models have a flaw that lets attackers pull serial numbers and create admin passwords. Follow @mikahsargent’s step-by-step guide to secure your Mac-connected printer. ▶️ https://twit.tv/shows/hands-on-apple/episodes/189 🎥 Club TWiT: https://twit.tv/clubtwit #PrinterSecurity #MacSafety
Critical security vulnerability discovered in Brother printers! Take action now to secure your devices. #PrinterSecurity #Cybersecurity #BrotherPrinters https://redoracle.com/News/Printer-Security-Alert.html
Printer Security Alert

Image Introduction Recent findings have uncovered a critical security vulnerability affecting numerous Brother printers, posing significant risks to users. This flaw, identified...

RedOracle

More information on printer security, since they are often a cybersecurity blind spot!

Last week, we shared a warning about the unpatchable Brother printer vulnerability (CVE-2024-51978) that puts millions of devices at risk. If you haven’t updated your default admin passwords, do it now.

Since there was a lot of interest in this topic, we're sharing our classic, but still very relevant, on-demand webinar, "How I met your printer": https://youtu.be/b6d6RO2AFgw

@tompohl shares real-world techniques attackers use to exploit printers for initial access and lateral movement—exactly what we see in our penetration tests all the time.

If you haven’t tested your print infrastructure, now’s the time. Need help? Our pentest team can assess your network and highlight hidden vulnerabilities.

#Cybersecurity #CISO #PrinterSecurity #PenetrationTesting #LMGSecurity #NetworkSecurity #Infosec #ITsecurity
#penetrationtesting #pentest #pentesting

Weaponar: How I Met Your Printer

YouTube

📰 Today's top stories, curated for you by Zorz Studios: http://zorz.it/newspaper

15 couple #MaternityPhotoshoot ideas, poses, and tips;
- Protecting your #business from #PrinterSecurity breach risks;
- Snowy June #wedding in #Montana caught on a webcam;
- #JonathanAnderson sets a new agenda at #Dior;
- Cairo’s #GrandEgyptianMuseum has all the makings of must-see destination, and more

#ZoracleDaily #newspaper

Hundreds of Brother printer models are affected by a critical, unpatchable vulnerability (CVE-2024-51978) that allows attackers to generate the default admin password using the device’s serial number—information that’s easily discoverable via other flaws.

748 total models across Brother, Fujifilm, Ricoh, Toshiba, and Konica Minolta are impacted, with millions of devices at risk globally.

Attackers can:
• Gain unauthenticated admin access
• Pivot to full remote code execution
• Exfiltrate credentials for LDAP, FTP, and more
• Move laterally through your network

Brother says the vulnerability cannot be fixed in firmware and requires a change in manufacturing. For now, mitigation = change the default admin password immediately.

Our pentest team regularly highlights printer security as a critical path to system compromise—and today’s news is another example that underscores this risk. This is your reminder: Printers are not “set-and-forget” devices. Treat them like any other endpoint—monitor, patch, and lock them down.

Need help testing your network for exploitable print devices? Contact us and our pentest team can help!

Read the Dark Reading article for more details on the Brother Printers vulnerability: https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug

#CyberSecurity #PenetrationTesting #Pentest #Pentesting #PrinterSecurity #BrotherPrinters #CVE202451978 #Infosec #IT #SMB #CISO #Cyberaware #DFIR #ITSecurity #ZeroTrust #PatchNow #Pentest

#Canon issued an advisory notifying printer owners that performing a factory reset does not necessarily remove your WiFi credentials off the device. They advised owners to manually clear the data from the printer before reselling, discarding or sending their device in for repairs.

#printer #printersecurity #wifi #infosec #cybersecurity

https://arstechnica.com/security/2023/08/canon-warns-printer-users-to-manually-wipe-wi-fi-settings-before-discarding
Canon warns printer users to manually wipe Wi-Fi settings before discarding

If you thought a factory reset wipes Wi-Fi passwords, you'd be wrong.

Ars Technica

HP announces a 90-day timeline to address a critical firmware vulnerability in several business-grade printer models. The flaw, CVE-2023-1707, could lead to information disclosure. Stay aware and protect your data by following us for updates on this and other cybersecurity news! #HP #PrinterSecurity #Cybersecurity

https://www.bleepingcomputer.com/news/security/hp-to-patch-critical-bug-in-laserjet-printers-within-90-days/

HP to patch critical bug in LaserJet printers within 90 days

HP announced in a security bulletin this week that it would take up to 90 days to patch a critical-severity vulnerability that impacts the firmware of certain business-grade printers.

BleepingComputer