TROMMEL sifts through embedded device files to identify potential vulnerable indicators. The tool can be used to search files and configurations in...
Recently, security researchers at the Mimecast Threat Center discovered a new vulnerability in the Microsoft Excel spreadsheet application, which has caused 120...
Critical Bug in Medical Infusion Pumps lets Attacker Remotely install Unauthorized Firmware to Change Medication Dosages. Researchers at CyberMDX, a healthcare security...
Victoria’s public health system is “highly vulnerable” to a Singapore-like data breach, according to a recent report. As per an auditor general...
A critical remote execution vulnerability in Microsoft remote desktop services enables let attackers compromise the vulnerable system with WannaCry level malware. Microsoft...
Linux operating system computers running versions prior to 5.0.8 kernel distributions are impacted by a vulnerability exposing systems committed to a wide...
Cloud cameras (AKA IP Cameras) provide convenient and easy to use visual monitoring device for offices, houses, and shops of all sizes....
Dell laptop and computer owners beware! Your machine is vulnerable to an attack that can be executed remotely to hijack your system —...
According to research, February 2019, at the University of Cambridge, it was found that many modern laptops desktop computers are vulnerable to...
With malware infestation, data breaches allegedly caused by state-funded actors and phishing attacks becoming headlines in both mainstream media and tech news...
The purpose of security apps is to protect devices and user data. However, Xiaomi’s pre-installed security app did just the opposite and...
Firefox 66.0.1 Released with Fix for Critical Security Vulnerabilities that discovered via Trend Micro’s Zero Day Initiative. The vulnerability affects all the...
Defibrillators are electronic devices manufactured to save the lives of people with life-threatening heart conditions such as Hypertrophic Cardiomyopathy (HCM). But now,...
As WordPress gained popularity over its CMS competitors like Joomla and Drupal, it grew to a level where plugin developers jumped into...
By gaining access to the vehicles, hackers can not only locate them but also open their doors and even turn off the...
Experts explain why this combination of characters has been linked to multiple incidents of data breach According to network security and ethical...
Two old vulnerabilities were exploited, allegedly by Chinese hackers The Cisco network security and ethical hacking teams recently detected intrusions from malicious...
DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement,...
Smart devices definitely make our lives easier, faster, and more efficient, but unfortunately, an insecure smart device can also ruin your day,...
The legacy-dependence of the financial sector is very evident, many banks are still using legacy hardware and software to perform their day-to-day...
A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily ‘footprint’...