Tag: Vulnerability
-
PowerGhost Malware Remotely Attack Corporate Network Servers & Workstations using EternalBlue Exploit
Newly discovered PowerGhost Malware Spreading across corporate networks that infecting corporate networks both workstations and servers …
-
NetSpectre – New Spectre Remote Attack over Network Affected Billions of Devices
Group of Security researchers discovered new Spectre remote attack called NetSpectre over a network connection that affected nearly billion …
-
“Simple trick” floors home security camera, gives anyone access
A few weeks ago, a headline popped up on the BBC that caught the eye of security researchers: “Swann home security camera sends video to …
-
Wyden urges government agencies to ditch Flash
Come the end of 2020, it will be time to stick a fork in Adobe Flash. That’s when, if you’ll forgive the mixed metaphor, the malware …
-
Samsung SmartThings Hub vulnerabilities allow attackers inside your home
Cisco Talos researchers have unearthed 20 vulnerabilities in the Samsung SmartThings Hub that could be leveraged by attackers to monitor, …
-
Same web-based vulnerabilities still prevalent after nine years
Analysis of vulnerabilities discovered by NCC Group researchers over the last nine years found that instances of common web-based …
-
NetSpectre Vulnerability Can Reveal Arbitrary Memory Over Network
NetSpectre is a new network-based speculative attack vulnerability that doesn’t require exploited code to be running on the target machine. …
-
Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities
Newly discovered malware campaign distributing powerful FELIXROOT Backdoor using Microsoft Office Vulnerabilities to compromise the …
-
Microsoft Office Vulnerabilities Used to Distribute FELIXROOT Backdoor in Recent Campaign
Campaign Details In September 2017, FireEye identified the FELIXROOT backdoor as a payload in a campaign targeting Ukrainians and reported …
-
Swann security cameras vulnerable to spying hack
Researchers have unearthed a security flaw in a Swann security camera that allows attackers to spy on the video and audio feed of …
-
Senator calls on US Government to start killing Flash now
Security-conscious IT administrators around the globe know that they shouldn’t really have Adobe Flash in their organisation. For years, …
-
Four Steps to Close the Window on Critical Vulnerabilities
Critical vulnerabilities (i.e., those that must be addressed by installing specific software updates) are the bane of existence for most IT …
●●●