Cyber Security
A vulnerability in Node.js that could allow a remote actor to perform domain hijacking attacks has been fixed. The maintainers of the JavaScript runtime environment have...
Hi, what are you looking for?
A vulnerability in Node.js that could allow a remote actor to perform domain hijacking attacks has been fixed. The maintainers of the JavaScript runtime environment have...
Security researchers have achieved remote code execution (RCE) on web hosting platform cPanel & WHM after bypassing CSRF protections and escalating privileges via a stored cross-site...
A security vulnerability in popular dating site OkCupid meant an attacker could dupe users into unknowingly ‘liking’ or sending messages to other profiles. The...
Attackers who exploit critical security vulnerabilities in Swisslog’s TransLogic Pneumatic Tube System (PTS) could potentially reroute or shut down the automated delivery of medications and other...
INTERVIEW Aaron Portnoy confesses to periodic bouts of imposter syndrome, despite having carved out a distinguished career in offensive security. Among other things, Portnoy – now...
WordPress is the world’s most popular content management system, powering around 40% of all websites globally. While the open source technology has helped millions of business...
Umbraco, a content management system (CMS) vendor, has given users of its form-building package a “heads-up” about an imminent software update addressing a remote code...
Amazon Web Services (AWS), has claimed that a partial data ‘leak’ in an API, discovered by a security researcher, is not a bug but...
Microsoft has awarded $13.6 million to security researchers under it bug bounty program in the past 12 months alone. The tech giant, which runs a number...
A vulnerability in the OWASP ModSecurity Core Rule Set (CRS) project that could allow attackers to bypass security mechanisms was present for several years, the maintainers...
Recent Comments