Vulnerability

Kr00k – CVE-2019-15126

Kr00k – CVE-2019-15126 is a vulnerability that affected billions of devices, potentially causing the leak of sensitive data and opening a new attack vector for blackhats. Following the discovery of the vulnerability, ESET responsibly disclosed it to the affected chip manufacturers Broadcom and Cypress (and, initially, to Amazon). We also contacted ICASI to ensure that […]

Kr00k – CVE-2019-15126 Read More »

2019 IBM X-Force Threat Intelligence Index

Nearly a year has passed since Australia’s mandatory data breach notification regime came into force. Over the last quarter, the highest reported source of breaches involved human factors such as clicking on an attachment to a phishing email. This trend is in line with the global statistics revealed by the latest annual 2019 IBM X-Force Threat Intelligence Index report, which suggests that one third of attacks analysed by X Force IRIS globally involved compromises via phishing emails.

2019 IBM X-Force Threat Intelligence Index Read More »

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)

The guide’s example solutions demonstrate the effectiveness of the Internet Engineering Task Force’s Manufacturer Usage Description Specification in strengthening security for IoT devices on home and small-business networks.

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD) Read More »

Cybersecurity Nexus (CSX) – Vulnerability and Exploitation Course (CVEC)

The Vulnerability and Exploitation Course (CVEC) provides students, who possess a basic understanding of penetration testing, a deeper understanding of vulnerability identification and exploitation capabilities. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment.

Cybersecurity Nexus (CSX) – Vulnerability and Exploitation Course (CVEC) Read More »

2018 State of Bug Bounty Report

The biggest difference between an unknown vulnerability and a known vulnerability, is the ability to take action on it.

Over the past year, there has been an increase of 21% in total vulnerabilities reported, and an increase of 36% in total bug bounty payouts.

Security leaders are beginning to realize that better awareness and information about disclosed vulnerabilities is critical to their operational success.

2018 State of Bug Bounty Report Read More »