Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Amazon Kindle Vulnerabilities Could Allow Threat Actors to Control Devices and Steal Information
Malware and Vulnerabilities
August 06, 2021
Check Point Research
The exploitation involves sending a malicious e-book to a victim. Once the e-book is delivered, the victim simply needs to open it to start the exploit chain. No other interactions are required.
Read More
Device Takeover
malicious e-book
Amazon Kindle
Information Theft
firmware
Publisher
Previous
Lawmakers roll out bipartisan bill to help track cyber ...
Laws, Policy, Regulations
Next
StarHub Suffers Breach Impacting 57,000 Customers via L ...
Breaches and Incidents