Want to get the latest web security news straight to your inbox? Now you can, with the upcoming launch of The Daily Swig’s first ever newsletter. We’re...
Detectify founder Frans Rosén has topped PortSwigger’s top 10 web hacking techniques of 2022 with ‘Account hijacking using dirty dancing in sign-in OAuth-flows’. Published in July, the...
XSS Hunter now has a home at Truffle Security, which has launched a new version of the tool after its original creator declared that he will be...
As 2022 draws to a close, The Daily Swig is revisiting some of the year’s most notable web security wins and egregious infosec fails. Yesterday we showcased the...
As 2022 draws to a close, HackerOne has revealed that cloud-based vulnerabilities became increasingly common this year as organizations embark on digital transformation. The bug bounty platform reported that researchers...
John Jackson has been working in cybersecurity for less than five years, but already has several significant wins under his belt. After five years as an engineer...
Tools to enable the work of security researchers, pen testers, and bug bounty hunters were demonstrated at this year’s Black Hat Europe conference, held at London’s Excel Centre...
Security certification body (ISC)² is being accused of promoting a series of ‘undemocratic’ changes to its bylaws. (ISC)² – the International Information System Security Certification Consortium...
Researchers warn that there has been a 633% year-over-year increase in cyber-attacks launched against open source software repositories. Open source components, frameworks, libraries, and whole platforms are relied...
Hidden DNS (domain name system) resolvers create a means for carrying out email redirection and account takeover attacks, security researchers warn. In a technical blog post,...
Recent Comments