[Browser Patch Time] If you are running on a Chromium based Browser you may want to ensure that you are on at least v87.0.4280.117 which patches a new attack variant on Network Address Translation (NAT) Slipstreaming vulnerability that is yet another sophisticated attack which simply requires just a visit to malicious website to carry out an attack on the device and its internal network
📜https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expose-all-internal-network-devices-to-the-internet/
[Browser Patch Time] If you are running on a Chromium based Browser you may want to ensure that you are on at least v87.0.4280.117 which patches a new attack variant on Network Address Translation (NAT) Slipstreaming vulnerability that is yet another sophisticated attack which simply requires just a visit to malicious website to carry out an attack on the device and its internal network
📜https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expose-all-internal-network-devices-to-the-internet/