Pen testers hunting for low-severity bugs found a far more severe cross-site request forgery (CSRF) flaw in the open source csurf software. Researchers from UK-based cybersecurity firm Fortbridge...
A security researcher has discovered a way to launch code execution attacks by exploiting the GitHub Pages build process. Joren Vrancken netted a $4,000 reward for...
The rush to patch systems affected by the landmark Log4Shell vulnerability has coincided with a wider improvement in patching rates for the most critical flaws, a...
A critical command injection vulnerability in a Bitbucket product could allow an attacker to execute arbitrary code, researchers warn. Bitbucket is a Git-based source code repository hosting service...
The global media industry is facing an onslaught of cybersecurity threats, as new research reveals that those serving the industry are disproportionately susceptible to compromise when...
A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could...
Group-IB has released new research on the state-sponsored hacker group APT41. The Group-IB Threat Intelligence team estimates that in 2021 the threat actors gained access to...
A vulnerability in Free IPA could lead to XML external entity (XXE) attacks, researchers have warned. FreeIPA is a free and open source identity management system...
Campaigners for reform of the UK’s Computer Misuse Act (CMA) have identified cybersecurity activities that should be legally defensible ahead of a government review of the...
https://player.vimeo.com/video/735409327?h=3676936e1e&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 With the continued rise in adoption of cloud services, bad actors are utilizing the InterPlanetary File System (IPFS) as a new playing ground for phishing attacks....
Recent Comments