Remote exploitation of an input validation error vulnerability in multiple versions of Linksys Inc.'s routers could allow attackers to execute arbitrary commands on the targeted host. This vulnerability was reported to be used in the "TheMoon" worm.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Posted on 21 January 2015. | Brandon Hoffman, Lumeta's CTO, talks about the management strategies that are essential in the information security industry. He also offers advice to those stepping into the CTO role for the first time, and talks about the evolution of network situational awareness.
Posted on 19 January 2015. | Security researcher Corey Thuen has made a surprising discovery when he reverse-engineered the firmware of the Snapshot tracking dongles that US-based Progressive Insurance gives out to its customers.
Posted on 19 January 2015. | Rather than spend resources on measures such as pen testing, itís now perhaps more relevant to find ways of monitoring for, rooting out, identifying and taking remedial action against malware and threats already inside a network.
Posted on 16 January 2015. | Since the three day terror attack that started in France with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers.