HackerOne has announced that its bug bounty programs have awarded over $300 million in rewards to ethical hackers and vulnerability...
While budget negotiations play out on Capitol Hill, federal agency CIOs are also on the clock to ensure the bulk of their information technology is reported...
A Stored Cross-Site Scripting (Stored XSS) vulnerability was recently discovered in Cacti that allows an authenticated user to poison the data stored in Cacti’s database. Moreover, administrative accounts can...
Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global leader in cybersecurity solutions, has revealed its strategic move to acquire Atmosec, an innovative Software as a Service...
The cyberattack that ultimately led to the breach of several U.S. officials’ email accounts was the result of a China-based threat actor accessing a corporate account...
How a cornerstone cybersecurity program has evolved from information collection to active defense. The Cybersecurity and Infrastructure Security Agency has used its Continuous Diagnostics and Mitigation...
Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, collaboration, and...
Samsung Mobile has issued fixes to address several security flaws discovered in Galaxy phones and tablets. In the September 2023 security patch, 62 bugs were fixed;...
Dastardly is a powerful web vulnerability DAST (Dynamic Application Security Testing) scanner developed to assist organizations in effectively safeguarding their web applications. It is a free, lightweight...
A Critical 0-day vulnerability was discovered in AtlasVPN for Linux, which can disconnect the AtlasVPN and leak the user’s IP address. The AtlasVPN, running a daemon on Linux,...
A Privilege Escalation was recently discovered, which affects Windows’s File History service and can be used by threat actors to gain escalated privileges on a Windows...
Recent Comments