Explore

vulnerability ×
  • screenshot

    How to bypass Cloudflare bot protection

    Several months ago I submitted what appeared to be a security flaw to CloudFalre’s bugbounty program....

  • screenshot

    Zero click vulnerability in Apple’s macOS Mail

    9 hours ago·4 min readI found a zero click vulnerability in Apple Mail, which allowed me...

  • screenshot

    Critical netmask networking bug impacts thousands of applications

    Popular npm library netmask has a critical networking vulnerability. netmask is frequently used by hundreds of...

  • Regexploit: DoS-able Regular Expressions · Doyensec's Blog

    11 Mar 2021 - Posted by Ben Caller When thinking of Denial of Service (DoS), we...

  • screenshot

    “You Can’t Protect What You Can’t See.” Cyber Hygiene and Zero-Day Vulnerability

    Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.“Facing fear is better...

  • screenshot

    Malicious NPM packages target Amazon, Slack with new dependency attacks

    Threat actors are targeting Amazon, Zillow, Lyft, and Slack NodeJS apps using a new 'Dependency Confusion'...

  • screenshot

    Chrome 88 update patches a zero-day that is being actively exploited

    Google Chrome’s autoupdate feature means we don’t usually need to think about being on the latest...

  • screenshot

    Important Software Security Terms You Should Know

    Smart Vulnerability ScannerEveryone in the IT industry should be aware of software security basics. It doesn’t...

  • screenshot

    Undocumented user account in Zyxel products (CVE-2020-29583)

    TL;DR: If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update...

  • screenshot

    Bouncy Castle crypto authentication bypass vulnerability revealed

    A severe authentication bypass vulnerability has been reported in Bouncy Castle, a popular open-source cryptography library....

  • screenshot

    Bouncy Castle cryptography bug enables easy password brute-force and auth bypass

    A severe authentication bypass vulnerability has been reported in Bouncy Castle, a popular open-source cryptography library....

  • 4M Docker Images Shows Half Have Critical Vulnerabilities

    Container security company Prevasio has analyzed 4 million public Docker container images hosted on Docker Hub...

  • screenshot

    How to steal photos off someone’s iPhone from across the street

    Well-known Google Project Zero researcher Ian Beer has just published a blog post that is attracting...

  • screenshot

    Grindr's Reset Token Vulnerability: A Technical Deep Dive

    Comp sci and cyber securityDating apps hold a treasure trove of information about their users which...

  • screenshot

    Update Windows 10 Now to Block 'SMBGhost'

    When even the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency is starting to get...

  • screenshot

    Here's Another Reason Using a Free Android VPN Is a Terrible Idea

    There’s no such thing as a great free VPN. Or, rather, there’s only one free VPN...