First and the second-day contest ended up with a various successful attempt to exploit the different bugs in multiple software…
Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and…
Researchers discovered a serious flaw in more than 30,000 IoT connected bathtubs that can be authenticated by remote attackers to…
A critical Vulnerabilities that affected FreeRTOS TCP/IP Stack puts millions of IoT devices at risk and let attackers allows to compromise the…
Staying connected when managing or owning a fleet is crucial. It is the only way to have real-time data and…
HNS(Hide & Seek) IoT botnet attack victims network using router-based vulnerabilities such as CVE-2016-10401 to propagate malicious code and steal the…
If you’re like millions of other people around the world, you have at least one, if not many, smart home…
New Mac Cyptominer Malware XMRig affected Mac users that cause a sudden increase of the CPU process called mshelper and…
Z-Wave, a Wireless Communication Protocol that widely used in IoT Smart Devices vulnerability allow attackers to perform Downgrade Attack and…
Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default…