Blog

Blog

Microsoft Launches Windows Sandbox

Microsoft unveiled a new sandbox for Windows this week that can allow users to run untrusted software without having to do so in a virtual machine.
Vulnerability Research

Analysis of NUUO NVRmini2 Stack Overflow Vulnerability

Exploiting CVE-2018-19864- Samuel S., Senior Vulnerability ResearcherDuring an audit of NUUO’s NVRmini2, a stack overflow vulnerability was discovered in a request handling function in the ‘lite_mv’ custom SIP service binary. The NUUO NVRmini2 runs a custom SIP service on TCP ports 5160 and 5150 via a binary at /NUUO/bin/lite_mv. In order to examine this bug more closely, we analyze the function...
Vulnerability Research

NUUO Firmware Disclosure

NUUO Zero-Day BlogA vulnerability identified in NUUO NVRmini2 Network Video Recorder devices discovered by our Vulnerability Research Team (VRT). We commend NUUO for their prompt response to the identified flaws and their engineering team’s work with VRT to provide fixes for these cyber security issues.NUUO has provided a patch for the vulnerability identified on the application. The patched...
Blog

The History of Data Breaches

As the wave of data breaches continues to crash down on companies, let’s take a look back at some of the largest and most damaging data breaches on record. Read on for a historical walk through breaches over time as well as resources for preventing data breaches.
Blog

HSBC US Customers Hit by Data Breach

HSBC, one of the largest banks in the world, confirmed this week that some of its US customers' bank accounts were hacked in October, possibly by stolen credentials.
Blog

Arcserve Zero-Day Disclosure

We are disclosing four previously undisclosed vulnerabilities within the Arcserve Unified Data Protection platform. The vulnerabilities can open the door for potential compromise of sensitive data through access to credentials, phishing attacks and the ability for a hacker to read files without authentication from the hosting system.________________________________________TitleDDI-VRT-2018-18 -...
Blog

Network Scanning for Complicated, Growing or Distributed Networks

Upgrade Your Network ScannerFree scanners are great – up to a point. That point is when your network reaches a critical size, your assets have acquired a critical value or your company, industry (or Uncle Sam) has set new compliance requirements that those freebee tools just can’t handle.Running multiple network scanning tools is a painEveryone has a half dozen network scanners sitting around and...
Blog

Port Scanning Tools VS Vulnerability Assessment Tools

Port scanning tools – just the first step to network securityYour port scanning tools are nice, but...When your network reaches a critical size, your assets have acquired a critical value or when new compliance standards hit, your port scanning tools may have reached their limit. It’s the job of vulnerability assessment and management tools to combine port scanning with the investigation of...