Category: Uncategorized

1 301 302 303 304 305 310 2121 / 2170 POSTS
Smart teddy bear maker faces scrutiny over data breach response

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animal ...
Siemens RUGGEDCOM NMS Equipment Vulnerable to CSRF, XSS

Siemens RUGGEDCOM NMS Equipment Vulnerable to CSRF, XSS

Enterprise network management equipment made by Siemens suffers from vulnerabilities that could allow an attacker to perform administrative actions.Tw ...
Dridex Trojan Gets A Major ‘AtomBombing’ Update

Dridex Trojan Gets A Major ‘AtomBombing’ Update

The Dridex banking Trojan has been updated and now sports a new injection method for evading detection based on the technique known as AtomBombing.Res ...
Unpatched SMB Zero Day Easily Exploitable

Unpatched SMB Zero Day Easily Exploitable

In what’s turning out to be the zero day that keeps on giving, researchers are still finding ways to exploit an unpatched denial of service vulnerabil ...

Edge and IE vulnerability disclosed by Project Zero

Google Project Zero's 90-day disclosure policy bites Microsoft again as a zero-day Edge/IE vulnerability is made public before a patch is available. ...
Children’s Voice Messages Leaked in CloudPets Database Breach

Children’s Voice Messages Leaked in CloudPets Database Breach

More than two million voice messages, many of them from children, along with the personal information of more than 800,000 registered users was swiped ...
This tool can help you discover Cisco Smart Install protocol abuse

This tool can help you discover Cisco Smart Install protocol abuse

For the past few weeks attackers have been probing networks for switches that can potentially be hijacked using the Cisco Smart Install (SMI) protoco ...
1 301 302 303 304 305 310 2121 / 2170 POSTS