Vulnerabilities

Remote Code Execution Vulnerability in VLC - Detection & Remediation with OPSWAT

November 13, 2019
Author: Thuong Truong Hoai, Software Engineer, OPSWAT Introduction VideoLAN VLC Media Player 2.2.x is prone to a Use-After-Free vulnerability, which an attacker can leverage to execute arbitrary code via crafted MKV files. Failed...

Shadow IoT: A Fine Kettle Of Fish

October 09, 2019
Author: Randy Abrams, Sr. Security Analyst, OPSWAT. We all have a fairly good idea of what IoT is. Depending upon who you talk to, IoT is the Internet of Things, the Insecurity of Things, or the Internet of Terror. If you work in an...

How the CIA Turns Routers into Surveillance Devices

June 19, 2017
A new release from Wikileaks reveals information about a tool the CIA developed in order to infect and spy on targets from wireless routers. Once routers are compromised, attackers have access to everything users are doing and can carry...
Tags: News

OPSWAT Enhances Metadefender Cloud Client with Release of Detection for WannaCry Vulnerability

May 19, 2017
MetaDefender Cloud Client - Click image to expand OPSWAT today announced the release of MetaDefender Cloud Client 4.0.6. The new release includes support for detection of Microsoft Windows vulnerability MS17-010, the vulnerability...

Ransomware Exploits: Detecting and Exploiting CVE-2008-2992 in Adobe Acrobat Reader

April 28, 2017 by Vinh Lam
A vulnerability is a security flaw in an application that attackers can exploit. Vulnerabilities leave software and systems open to all sorts of cyber attacks. Software vendors repair these vulnerabilities in the form of patches or...

Unpatched Vulnerabilities in BYOD Environments Leave Organizations Exposed to Attacks

April 21, 2017 by Yiyi Miao
With botnets, DDoS attacks, and secret lists of exploits being all over the news in recent months, vulnerabilities should be top of mind for anyone who's concerned with cyber security, especially vulnerabilities in consumer...

IoT Devices with Unpatched Vulnerabilities Are a Growing Danger

March 16, 2017 by Chris Qiao
The Internet of Things is growing every day, and all kinds of "smart" consumer devices are connecting to the internet. But such technological progress brings risks: Often, these devices expose vulnerabilities that attackers can exploit...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.