Vulnerabilities | Alerts | Solutions

Vulnerabilities | Alerts | Solutions

Roku TV, Sonos Speaker Devices Open to Takeover | Threatpost

The DNS rebinding flaw reported in Google Home and Chromecast devices earlier this week is about to get a patch — but the same type of flaws have come to...

Financial Services Sector Rife with Hidden Tunnels | Threatpost

Global financial services organizations are seeing a significant uptick in the rate of being actively targeted by sophisticated cyber-attackers using hidden-tunnel techniques for post-intrusion data exfiltration. In an attempt to steal...

New Phishing Scam Reels in Netflix Users to TLS-Certified Sites | Threatpost

Researchers are warning of a new Netflix phishing scam that leads victims to sites with valid Transport Layer Security (TLS) certificates. Johannes Ullrich, dean of research at the SANS Technology Institute,...

Mylobot Botnet Emerges with Rare Level of Complexity | Threatpost

An unusual botnet dubbed Mylobot has emerged, percolating up from the Dark Web – and displaying a never-before-seen level of complexity in terms of the sheer breadth of its various...

APT15 Pokes Its Head Out With Upgraded MirageFox RAT | Threatpost

The elusive APT15 cyber-espionage group, believed to be affiliated with the Chinese government, has been spotted for the first time in many months, mounting a highly targeted spy campaign using...

“Unbreakable” Smart Lock Tapplock Issues Critical Security Patch | Threatpost

Tapplock, a smart padlock that received positive reviews and media hype when it was released earlier this year, has issued a critical patch after researchers discovered several security issues enabling...

Google Home, Chromecast Leak Location Information | Threatpost

Google Home and Chromecast devices allow attackers to uncover the precise physical locations of the connected gadgets thanks to two common internet of things issues present in both. A fix...

macOS QuickLook Feature Leaks Data Despite Encrypted Drive | Threatpost

Researchers are cautioning macOS users that not all the data they store on their encrypted hard drive is protected. In a report published Monday, Apple security expert Patrick Wardle revealed...

22K Open, Vulnerable Containers Found Exposed on the Net | Threatpost

More than 22,000 container orchestration and API management systems are unprotected or publicly available on the internet – highlighting the reality of the risks of operating workloads in the cloud. According...

Axis Cameras Riddled With Vulnerabilities Enabling “Full Control” | Threatpost

A slew of vulnerabilities in Axis cameras could enable an attacker to access camera video streams, control the camera, add it to a botnet or render it useless. Researchers at VDOO,...