Millie
your market intelligence analyst
Search Results
411 results
Your search is now limited to «Exploits and Security Flaws» expert search.
Dark Reading 06/04/2020 12:20
Their research unearthed 621 files containing exploit code, based on VirusTotal's verdicts of exploits, between Nov. 1, 2019, and April 1, 2020.
More from Dark Reading:
HotHardware.com 06/03/2020 13:15
The security flaw, tracked as CVE-2020-12753, affected every single smartphone that LG made over the last seven years.
More from HotHardware.com:
Digital Guardian 06/02/2020 13:28
According to the NSA, the agency has seen Russian attackers exploit victims using Exim software on their public facing MTAs by sending a command in the "MAIL FROM" field of an SMTP (Simple Mail Transfer Protocol) message.
More from Digital Guardian:
TechRadar 06/02/2020 09:48
Hackers could exploit the flaw in VMware Cloud Director via Flex- and HTML5-based user interfaces, the API Explorer interface and API access, VMware noted.
More from TechRadar:
SecurityWeek 06/02/2020 04:57
Apple on Monday released security patches to address a zero-day vulnerability that had been used to jailbreak iPhones running iOS 13.5.
More from SecurityWeek:
DataBreachToday.com 06/01/2020 16:50
June 1, 2020 An independent security researcher disclosed a zero-day vulnerability contained in the "Sign in with Apple" feature that, if exploited, could have resulted in a full account takeover.
More from DataBreachToday.com:
TechSpot 06/01/2020 14:21
Bug bounty hunter snags $100,000 award for zero-day bug in Apple's single sign-in system.
More from TechSpot:
Computer Business Review 06/01/2020 13:22
"Setting the host default to reject router advertisements should prevent attacks from succeeding but may break legitimate traffic". .
More from Computer Business Review:
In theory, any online service that supports Sign in with Apple, and that didn’t have any additional login checks of its own, could have been vulnerable to this “login sidestep” flaw.
More from Naked Security - SophosLabs blog:
SC Magazine 06/01/2020 09:28
The actors exploited victims using Exim software on their public facing MTAs by sending a command in the ‘MAIL FROM’ field of an SMTP.
More from SC Magazine:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded

Analysts

Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications