Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus

By Talos Group Executive Summary The Foscam C1 is a webcam that is marketed for use in a variety of applications including home security monitoring. As an indoor webcam, it is designed to be set up inside of a building and features the ability to be accessed remotely via a web interface or from within […]

Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus

By Talos Group Executive Summary The Foscam C1 is a webcam that is marketed for use in a variety of applications including home security monitoring. As an indoor webcam, it is designed to be set up inside of a building and features the ability to be accessed remotely via a web interface or from within […]

Crashoverride und Industroyer gefährden Industrieanlagen

Aktuell veröffentlichten die beiden Sicherheits-Unternehmen ESET und Dragos Inc. ihre jeweilige Analyse der Schadsoftware Crashoverride, bzw. Industroyer. Trotz unterschiedlicher Bezeichnung beziehen sich beide Analysten auf den Stromausfall Ende 2016 in Kiew und Teilen der Ukraine und ordnen diesen als Cyberattacke ein. Als größte Bedrohung für Industrieanlagen seit Stuxnet (der das iranische Atomprogramm maßgeblich gelähmt hatte) bezeichnen […]

Deep dive in Lexmark Perceptive Document Filters Exploitation

By Talos Group This post authored by Marcin Noga with contributions from Nick Biasini Introduction Talos discovers and releases software vulnerabilities on a regular basis. We don’t always publish a deep technical analysis of how the vulnerability was discovered or its potential impact. This blog will cover these technical aspects including discovery and exploitation. Before […]

Deep dive in Lexmark Perceptive Document Filters Exploitation

By Talos Group This post authored by Marcin Noga with contributions from Nick Biasini Introduction Talos discovers and releases software vulnerabilities on a regular basis. We don’t always publish a deep technical analysis of how the vulnerability was discovered or its potential impact. This blog will cover these technical aspects including discovery and exploitation. Before […]

How to post a successful Mantis Request

Source:: Innovaphone

How to post a successful Mantis Request

Source:: Innovaphone