Websites are making heavier use of a technology called CNAME tracking to get around ad blockers on the web – much to the detriment of both privacy and...
A novel alternative to traditional HTTP request smuggling that spotlighted an obsolete, hitherto obscure protocol has been recognized as 2020’s top web hacking technique. Unveiled by Bishop Fox...
Security researchers at Detectify have discovered a series of middleware misconfigurations in Nginx that could leave web applications vulnerable to attack. Lightweight, modular, open source, and with...
The maintainers of systeminformation, a popular Node.js package, have patched a bug that left applications vulnerable to command injection attacks. Systeminformation provides dozens of functions for retrieving...
A bug bounty hunter claims he has earned a $5,000 reward from Apple for reporting a stored cross-site scripting (XSS) vulnerability on iCloud.com. Vishal Bharad, a...
UPDATED Security researchers have unveiled details of a series of flaws in Palo Alto Network’s firewall software addressed by the networking vendor last September. The swarm of...
A security vulnerability in the macOS version of Telegram has been patched which prevented audio and video conversations set to ‘self-destruct’ from being deleted locally. The...
A vulnerability in a Docker Engine security feature potentially allowed attackers to escalate privileges from a remapped user to root. “The two avenues of exploitation I...
Walmart and Amazon are continuing to sell faulty smart doorbells and cameras filled with vulnerabilities that could expose customers’ sensitive information, according to research published Thursday....
An Internet Explorer zero-day vulnerability has been discovered used in recent North Korean attacks against security and vulnerability researchers. Last month, Google disclosed that the North...
Recent Comments