Intel Foreshadow Vulnerability
Researchers have identified new vulnerabilities in many Intel processors called Foreshadow or L1TF (L1 Terminal Fault). This vulnerability consists of 3 major vulnerabilities: CVE-2018-3615: Vulnerabi...
Researchers have identified new vulnerabilities in many Intel processors called Foreshadow or L1TF (L1 Terminal Fault). This vulnerability consists of 3 major vulnerabilities: CVE-2018-3615: Vulnerabi...
Dutch researchers found a new vulnerability in Intel processors which have Hyper-threading enabled.The vulnerability allows the extraction of crypto keys from other programs running on the same proces...
The report below provides an overview of all Windows assets in your Lansweeper installation which have a Google Chrome version not like version 67.%Please note that if you have Chrome installations ab...
A new vulnerability has been discovered in Google Chrome. Web pages designed to utilize this vulnerability can allow for an attacker to perform arbitrary code executions in context of the browser. Thi...
Based on the information from multiple sources, routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices are vulnerable to this malware.Based on inf...
Due to the recent discovery of the new VPNFilter malware, we created a report to discover potential vulnerable devices.The VPNFilter malware allows attackers to gather information and even disable equ...
An arbitrary code execution vulnerability has recently been discovered in 7-Zip. By exploiting this arbitrary code execution, depending on the privileges of the user, an attacker can install programs;...
Update 7th of May, posted a different report that is immune to conversion errors: due to the high variance in the formatting of 7-zip version numbers our previous report could cause conversion errors ...
In light of the recent Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability, we created a report which can be used to find possible vulnerable Cisco switches.Cisco switches ...
Support for modifying this report will end on the 2nd of April 2018, newly released KB after that date will need to be manually added.Recently it has become clear that there are some critical vulnerab...
This report lists all computers on which the Intel Discovery tool for vulnerability Intel-SA-00086 has been run. Registry scanning set up as per this post and having run this deployment package are pr...
DISCLAIMER: The Intel discovery tool has been known to hang on Virtual Machines. As a result running the package on a VM may cause it to hang and end up on a 'Package Timeout' error.Intel has identifi...
Prior to running the report follow the instructions found in this blog post.Select Top 1000000 tblAssets.AssetID,tblAssets.AssetName,tblAssets.Domain,tblAssets.Username,tblAssets.Userdomain,tsysAssetT...
Another malware called Adylkuzz has been reported to have been using the same SMB vulnerability as the WannaCry ransomware cyber-attack. Unlike WannaCry, Adylkuzz will not lock the computer it is loca...
SUPPORT FOR THIS REPORT WILL END ON THE 31ST OF AUGUST 2017As has been reported over the news, on the 12th of May a ransomware program ‘WannaCry’ ('WannaCrypt', 'WCRY') targeting Microsoft Windows com...
SUPPORT FOR THIS REPORT WILL END ON THE 31ST OF AUGUST 2017As has been reported over the news, on the 12th of May a ransomware program ‘WannaCry’ ('WannaCrypt', 'WCRY') targeting Microsoft Windows com...