The number of connected devices deployed in today’s enterprise IT infrastructure represents a serious cyber risk to networks and their associated data and systems. Srinivas Loke of Ordr discusses how asset inventory and attack surface visibility could help manage vulnerabilities…
Source: www.spiceworks.com – Read more

TBK DVR Vulnerability CVE-2024-3721 Exploited to Spread Nexcorium DDoS Malware
Hackers are actively exploiting a critical vulnerability in TBK digital video recorder (DVR) devices to deploy a new Mirai-based botnet called Nexcorium. The campaign leverages


