Hide ‘N Seek botnet also includes exploits for home automation systems

8 years ago

Security experts from Fortinet have discovered that the Hide ‘N Seek botnet is now targeting vulnerabilities in home automation systems. The Hide ‘N Seek…

Korean Davolink routers are easy exploitable due to poor cyber hygene

8 years ago

Davolink dvw 3200 routers have their login portal up on port 88, the access is password protected, but the password…

The Death botnet grows targeting AVTech devices with a 2-years old exploit

8 years ago

A new botnet, tracked as Death botnet has appeared in the threat landscape and is gathering unpatched AVTech devices with…

Apache Software Foundation fixes important flaws in Apache Tomcat

8 years ago

The Apache Software Foundation has rolled out security updates for the Tomcat application server that address several flaws. The Apache…

CVE-2018-5383 Bluetooth flaw allows attackers to monitor and manipulate traffic

8 years ago

Security researchers have found a high severity flaw (CVE-2018-5383) affecting some Bluetooth implementations that allow attackers to manipulate traffic. Security researchers at the…

Android Debugging Tools Also Useful for Compromising Devices, Mining Cryptocurrency

8 years ago

It is common for developers to use debugging tools with elevated privileges while they are trying to troubleshoot their code.…

DHS – Russian APT groups are inside US critical infrastructure

8 years ago

The US Government is warning of continuous intrusions in National critical infrastructure and it is blaming the Kremlin for the…

SpectreRSB – new Spectre CPU side-channel attack using the Return Stack Buffer

8 years ago

Researchers from the University of California, Riverside (UCR) have devised a new Spectre CPU side-channel attack called SpectreRSB. SpectreRSB leverage the speculative…

Sony addresses remotely exploitable flaws in Sony IPELA E Network Cameras

8 years ago

Sony fixed 2 remotely exploitable flaws in Sony IPELA E Series Network Camera products that could be exploited to execute commands…

Experts warn of new campaigns leveraging Mirai and Gafgyt variants

8 years ago

Security experts are warning of an intensification of attacks powered by two notorious IoT botnets, Mirai and Gafgyt. Security experts…

This website uses cookies.