
Kaufman County Sheriffs Office
Excellent
None
Excellent
None
Excellent
Historiku i PK-së Më 6 shtator të vitit 1999, Misioni i OSBE-së në Kosovë, në pajtim me Rezolutën e Kombeve të Bashkuara 1244, ka hapur Shkollën e policisë dhe ka filluar trajnimin e kandidatëve për pjesëtarë të Policisë së Kosovës. Gjenerata e parë e kandidatëve për pjesëtarë të këtij Shërbimi filloi trajnimin në këtë qendër më 6 Shtator 1999. Kjo gjeneratë numëroi 176 pjesëtar të cilët me sukses përfunduan trajnimin dhe pastaj filluan ushtrimin e veprimtarisë policore në tërë territorin e Kosovës si policët e parë të këtij Shërbimi. Një shërbim i ri i krijuar në bazat e një policie demokratike dhe profesionale.Një shërbim i hapur dhe i barabartë për të gjithë të interesuarit që dëshrirojnë të bëhen pjesëtarë të këtij shërbimi. Trajnimi në Shkollën e Policisë së Kosovës është një trajnim me standarde të larta duke përfshirë: Kodin e Etikës Policore, Legjislaturën e aplikueshme në Kosovë, Hetimin e Krimit, grumbullimin e evidencave dhe metodën e intervistave, politikën demokratike dhe fokusimi në besueshmërinë e rregullave të ligjit demokratik, përdorimin e armëve të zjarrit, forenzikën dhe evidencën, kontrollin e trafikut, etj. Pas përfundimit të trajnimit me sukses në Shkollën e Policisë së Kosovës, pjesëtarët e këtij shërbimi vazhdojnë me programin e Trajnimit Fushor në stacionet policore, me trajner të qertifikuar. Të gjithë pjesëtarët e Policisë së Kosovës janë të përkushtuar në shërbimin e tyre, duke u mbështetur në VIZIONIN, MISONIN DHE NË VLERAT E KËTIJ SHËRBIMI.
Security & Compliance Standards Overview
No incidents recorded for Kaufman County Sheriffs Office in 2025.
No incidents recorded for Kosovo Police in 2025.
Kaufman County Sheriffs Office cyber incidents detection timeline including parent company and subsidiaries
Kosovo Police cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
A vulnerability was determined in Tomofun Furbo 360 and Furbo Mini. The impacted element is an unknown function of the file /etc/shadow of the component Password Handler. Executing manipulation can lead to use of weak hash. The physical device can be targeted for the attack. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been publicly disclosed and may be utilized. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tomofun Furbo 360 and Furbo Mini. The affected element is an unknown function of the component Root Account Handler. Performing manipulation results in use of hard-coded password. The attack must be initiated from a local position. The attack is considered to have high complexity. The exploitability is described as difficult. The exploit has been made public and could be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Tomofun Furbo 360 and Furbo Mini. Impacted is an unknown function of the file TF_FQDN.json of the component GATT Interface URL Handler. Such manipulation leads to server-side request forgery. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Tomofun Furbo 360 and Furbo Mini. This issue affects some unknown processing of the component GATT Service. This manipulation of the argument DeviceToken causes information disclosure. The attack is only possible within the local network. A high degree of complexity is needed for the attack. The exploitability is assessed as difficult. The exploit has been published and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was detected in Tomofun Furbo 360 and Furbo Mini. This vulnerability affects unknown code of the component GATT Service. The manipulation results in improper access controls. The attack can only be performed from the local network. The exploit is now public and may be used. The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.