Vulnerabilities & Exploits
- 15 августа 2019A look into the cybersecurity risks surrounding critical infrastructures integrated with industrial internet of things (IIoT), and the recommendations to mitigate against these threats.
- 08 августа 2019Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.
- 06 августа 2019There’s a new player in the exploit kit landscape. Dubbed Lord, this new exploit kit was initially seen delivering the njRAT malwarebefore distributing the Eris ransomware. Here's what you need to know about this threat.
- 31 июля 2019Small planes were found vulnerable to attacks through their CAN bus components. DHS released a security advisory for owners and manufacturers to take steps against possible exploits.
- 31 июля 2019Sophisticated software has helped industries grow and thrive in unmatched ways, but there are also risks and consequences that come with new technology.
- 30 июля 2019The different threat scenarios that can happen to a smart home illustrate that compromised IoT devices can affect not just users' comfort and convenience but also their safety.
- 29 июля 2019Hackers use fileless threats to take advantage of existing applications and attack systems. Here we discuss noteworthy events, techniques, and best practices that can help identify fileless threats and defend against attacks.
- 23 июля 2019The US Department of Education released a security advisory on ERP vulnerabilities after 62 institutions were infiltrated, stealing students' IDs to create fake accounts.
- 19 июля 2019A quick review of some of the most destructive cyberattacks and data breaches over the past few years show just how much damage unpatched vulnerabilities can inflict on an organization.