Cyber Security
A security researcher has detailed how he was able to hack into systems belonging to Apple, Microsoft, PayPal, and other major tech companies in...
Hi, what are you looking for?
A security researcher has detailed how he was able to hack into systems belonging to Apple, Microsoft, PayPal, and other major tech companies in...
A vulnerability in a Docker Engine security feature potentially allowed attackers to escalate privileges from a remapped user to root. “The two avenues of...
The German armed forces (‘Bundeswehr’) has reported a promising start to its recently launched vulnerability disclosure program (VDPBw). Despite the absence of paid bug...
A North Korean government-backed hacking group has been leveraging researchers’ curiosity for vulnerability research and exploit development, according to a recent Google Threat Analysis Group report....
Fully-functional exploit code is now publicly available for a maximum severity pre-auth vulnerability impacting default configurations of an SAP Solution Manager (SolMan) component. SAP...
Threat levels have ratcheted up a notch about miscreants who posted an exploit that targets a security vulnerability in SAP’s enterprise software. The functional...
Attackers can bypass CoTURN servers’ default access control rules and access network services behind the firewall, security researchers have discovered. One researcher speculated that, under certain...
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business...
Attackers can bypass password checks in applications that use Bouncy Castle’s OpenBSDBcrypt class because of recently discovered cryptographic mistakes in the widely used encryption library. The authentication bypass vulnerability (CVE-2020-28052)...
Security researchers on Thursday documented and described a new injection technique capable of extracting sensitive data from PDF files. “One simple link can compromise...
Recent Comments