Weaknesses in an IT system which could be exploited to deliver a successful attack
Have you ever wondered what it's like to work in the NCSC Vulnerability Research team, and how it compares to working in industry?
We would like your feedback on the Weekly Threat Report. Please send us your thoughts, suggestions and queries using our 'Contact Us' page.
This report is drawn from recent open source reporting.
Vulnerabilities in connected toys could potentially enable a stranger to talk to a child.