The post Undetected e.04: TomNomNom – Hacking things back together appeared first on Detectify Blog.
Amazon has placed a moratorium on police use of its facial recognition platform – but a congressman asked if that extends to its Ring smart doorbell in a new inquiry.
The post A summer learning list for better security awareness appeared first on Detectify Blog.
A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.
Never-before-seen Android spyware tools have been used in a widespread APT campaign to spy on the Uyghur ethnic minority group – since 2013.
Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.
The patches fix two separate RCE bugs in Windows Codecs that allow hackers to exploit playback of multimedia files.
The spy malware is being delivered via a complex infrastructure with multiple layers, in an effort to avoid analysis.
An authentication-bypass vulnerability allows attackers to access network assets without credentials when SAML is enabled on certain firewalls and enterprise VPNs.