Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited […]
Category: Blog
A set of vulnerabilities in the Cisco Discovery Protocol (CDP) exposes tens of millions of devices to the […]
Check Point experts discovered a high-severity flaw in Philips Hue Smart Light Bulbs that can be exploited to gain entry […]
Microsoft published an interesting report that investigates web shell attacks, the IT giant says it detects 77,000 active […]
File hosting service company Dropbox paid out $1 million for vulnerabilities reported by researchers through its bug bounty […]