One of the main contributors to the weak security posture of development environments is the complexity and knowledge gap created by the number of tools and...
An open source tool that makes grepping the internet for web vulnerabilities simpler, faster, and cheaper was unveiled at Black Hat USA today. Security researchers and bug bounty...
UPDATED A 12-year-old authentication bypass vulnerability that could allow attackers to compromise networks and devices has been discovered in at least 20 router models, potentially affecting millions of users....
A security vulnerability in popular dating site OkCupid meant an attacker could dupe users into unknowingly ‘liking’ or sending messages to other profiles. The flaw, which...
High-severity and critical vulnerabilities collectively referred to as INFRA:HALT are affecting all versions of NicheStack below 4.3, a proprietary TCP/IP stack used by at least 200...
New Cobalt Strike bugs allow takedown of attackers’ servers However, Cobalt Strike is also used by threat actors (commonly seen used during ransomware attacks) for post-exploitation...
Attackers who exploit critical security vulnerabilities in Swisslog’s TransLogic Pneumatic Tube System (PTS) could potentially reroute or shut down the automated delivery of medications and other vital items...
A joint report has been published by several global cybersecurity agencies alerting about top exploited vulnerabilities in 2020 and 2021. This joint cybersecurity advisory is issued...
Node.js has released updates for a high severity vulnerability that could be exploited by attackers to corrupt the process and cause unexpected behaviors, such as application...
A vulnerability patched recently in the WordPress Download Manager plugin could be abused to execute arbitrary code under specific configurations, the Wordfence team at WordPress security...
Recent Comments