Continuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this...
Read moreContinuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this...
Read moreContinuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this...
Read moreTwelve-Year-Old Vulnerability Found in Windows Defender
February 24 2021
Researchers found, and Microsoft has patched, a vulnerability in Windows Defender that has been around for twelve years. There is no evidence that anyone has used the vulnerability...
Read moreDependency Confusion: Another Supply-Chain Vulnerability
February 23 2021
Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files. From a...
Read moreCyber Criminals Exploit Accellion FTA for Data Theft and Extortion
February 22 2021Starting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion’s legacy File Transfer Appliance (FTA) to install a newly discovered...
Read moreCyber Criminals Exploit Accellion FTA for Data Theft and Extortion
February 22 2021Starting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion’s legacy File Transfer Appliance (FTA) to install a newly discovered...
Read moreRouter Security
February 19 2021
This report is six months old, and I don’t know anything about the organization that produced it, but it has some alarming data about router security.
Conclusion: Our analysis...
Read more
Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One)
February 17 2021In 2019, Mandiant’s Red Team discovered a series of vulnerabilities present within Digi International’s ConnectPort X2e device, which allows for remote code execution as a privileged ...
Read moreShining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two)
February 17 2021In this post, we continue our analysis of the SolarCity ConnectPort X2e Zigbee device (referred to throughout as X2e device). In Part One, we...
Read more
Recent Comments