Month: May 2018
-
Making Sure AI Is Safe From Hackers
Many of the advances in AI in the past year or so have come about as a result of Deep Neural Networks (DNNs), whose power comes from their …
-
Presentation: Healthy Agile Product Security
Molly Crowther discusses how the Pivotal CF teams are working on a secure development lifecycle, some pain points encountered, and best …
-
Cryptocurrency-mining Malware Sold in Underground Markets Targeting IoT Devices
Cryptocurrency mining attacks, attackers targeted a number of internet portals and different kinds of servers. Hackers taking each and …
-
Fresh fright of data-spilling Spectre CPU design flaws haunt Intel
Researchers have unearthed a fresh new set of ways attackers could potentially exploit data-leaking Spectre CPU vulnerabilities in Intel …
-
Norton Core Secure WiFi Router – ‘BLE’ Command Injection (PoC)
Norton Core Secure WiFi Router – ‘BLE’ Command Injection …
-
GPON Routers – Authentication Bypass / Command Injection
GPON Routers – Authentication Bypass / Command …
-
TBK DVR4104 / DVR4216 – Credentials Leak
TBK DVR4104 / DVR4216 – Credentials …
-
Windows Kernel Exploitation Tutorial Part 8: Use After Free
Windows Kernel Exploitation Tutorial Part 8: Use After …
-
Linux Kernel < 4.17-rc1 - 'AF_LLC' Double Free
Linux Kernel < 4.17-rc1 - 'AF_LLC' Double ...
-
DLINK DCS-5020L – Remote Code Execution (PoC)
DLINK DCS-5020L – Remote Code Execution …
●●●