Researchers have disclosed a critical issue in Hyundai and Genesis vehicles that could be exploited to remotely control a car. Yuga Labs staff security engineer Sam...
An open source Go implementation of the SAML protocol has patched a critical vulnerability that could allow attackers to bypass authentication in applications that used the library. SAML...
Our inaugural web security roundup begins with the news that thousands of applications were found to be leaking API keys for Algolia. Algolia technology is used by the likes...
Remote access and collaboration company GoTo disclosed today that they suffered a security breach where threat actors gained access to their development environment and third-party cloud...
Vulnerabilities in mobile apps exposed Hyundai and Genesis car models after 2012 to remote attacks that allowed unlocking and even starting the vehicles. Security researchers at...
Researchers have disclosed a critical issue in Hyundai and Genesis vehicles that could be exploited to remotely control a car. Yuga Labs staff security engineer Sam...
Bug bounty platform HackerOne has launched a scheme to encourage customers to adopt a standard policy geared towards protecting hackers from potential legal problems. The Gold Standard Safe Harbor...
The agency is exercising its authority to regulate pipelines and railways after issuing a series of short-term emergency security directives. The Transportation Security Administration is looking...
UPDATED A series of flaws in Tailscale, an open source mesh virtual private network (VPN) software, could allow attackers to stage remote code execution (RCE) attacks against...
A security researcher has released details of how they were able to hack Intel’s Data Center Manager (DCM). More specifically, Julien Ahrens of RCE Security succeeded...
Recent Comments