Monday, June 24, 2024

tag:

security

Privilege Escalation Techniques & Resources

Welcome to the Privilege Escalation Resources guide! This comprehensive compilation aims...

IoT Devices That make Security Pros Cringe

In cybersecurity, if it isn't one thing, it's another 14.4 billion...

ieGeek IG20 CCTV Multiple Vulnerabilities – CVE-2022-38970

Amazon's ieGeek brand may be "highly rated" and "recommended," but recent security concerns have been raised regarding their CCTV cameras, including the predictable UID weakness in the IG20 model. Read on to learn more. #ieGeek #securityvulnerabilities #CCTVcameras

APISec: Broken access controls, injection attacks plague the enterprise security landscape in 2022

API-related security vulnerabilities continue to be a thorn in the side...

Comparing Twilio and Slack breach responses

We recently learned about major security breaches at two tech companies, Twilio and Slack....

New Traffic Light Protocol (TLP) standard released after five years

The Forum of Incident Response and Security Teams (FIRST) has published...

Targeted attacks on industrial enterprises and public institutions

In January 2022, Kaspersky ICS CERT experts detected a wave of...

Akamai: We stopped record DDoS attack in Europe

A 'sophisticated, global botnet' held an Eastern European biz under siege...

Many wireless peripherals are vulnerable to a range of attacks, here’s an example!

Wireless peripherals and computer accessories offer mess-free convenience in the workspace,...