Several Cable Modem Models Affected by SNMP God Mode Flaw
A severe security flaw in the implementation of the SNMP protocol allows an attacker to take over at least 78 cable modem models, according to a team of researchers. TheRead More →
A severe security flaw in the implementation of the SNMP protocol allows an attacker to take over at least 78 cable modem models, according to a team of researchers. TheRead More →
People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by a new strain of malware encounteredRead More →
‘We stand ready to work with the FCC, Congress and the industry on an approach that provides strong consumer protections while also allowing companies the flexibility and certainty to innovate,Read More →
Lawsuit: After a sexual harassment claim, Fox News planted spyware on ex-host’s computer. Comparing their actions to the plot this season on the Showtime series Homeland, an attorney for formerRead More →
Security experts from security firm Redsocks published an interesting report on how to crack APT28 traffic in a few seconds. Introduction APT28 is a hacking group involved in many recentRead More →
An unknown security researcher has published details on a vulnerability named “Antbleed,” which the author claims is a remote backdoor affecting Bitcoin mining equipment sold by Bitmain, the largest vendorRead More →
There are over 85,000 RDP servers available for sale or rent via xDedic, a marketplace for selling or renting hacked servers that was exposed in June 2016. Many believed xDedicRead More →
Among all the Linux samples that we receive every day, we noticed one sample detected only by Dr.Web – their detection name was Linux.LuaBot. We deemed this to be suspiciousRead More →
Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security vulnerabilities in the Hyundai Blue Link mobile apps could beRead More →
If you’re on a red team or have been on the receiving end of a pen-test report from one, then you’ve almost certainly encountered reports of Windows servers vulnerable toRead More →