Explore

How to bypass Cloudflare bot protection
Several months ago I submitted what appeared to be a security flaw to CloudFalre’s bugbounty program....

Zero click vulnerability in Apple’s macOS Mail
9 hours ago·4 min readI found a zero click vulnerability in Apple Mail, which allowed me...

Critical netmask networking bug impacts thousands of applications
Popular npm library netmask has a critical networking vulnerability. netmask is frequently used by hundreds of...
Regexploit: DoS-able Regular Expressions · Doyensec's Blog
11 Mar 2021 - Posted by Ben Caller When thinking of Denial of Service (DoS), we...

“You Can’t Protect What You Can’t See.” Cyber Hygiene and Zero-Day Vulnerability
Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.“Facing fear is better...

Malicious NPM packages target Amazon, Slack with new dependency attacks
Threat actors are targeting Amazon, Zillow, Lyft, and Slack NodeJS apps using a new 'Dependency Confusion'...

Chrome 88 update patches a zero-day that is being actively exploited
Google Chrome’s autoupdate feature means we don’t usually need to think about being on the latest...

Important Software Security Terms You Should Know
Smart Vulnerability ScannerEveryone in the IT industry should be aware of software security basics. It doesn’t...

Undocumented user account in Zyxel products (CVE-2020-29583)
TL;DR: If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update...

Bouncy Castle crypto authentication bypass vulnerability revealed
A severe authentication bypass vulnerability has been reported in Bouncy Castle, a popular open-source cryptography library....

Bouncy Castle cryptography bug enables easy password brute-force and auth bypass
A severe authentication bypass vulnerability has been reported in Bouncy Castle, a popular open-source cryptography library....
4M Docker Images Shows Half Have Critical Vulnerabilities
Container security company Prevasio has analyzed 4 million public Docker container images hosted on Docker Hub...

How to steal photos off someone’s iPhone from across the street
Well-known Google Project Zero researcher Ian Beer has just published a blog post that is attracting...

Grindr's Reset Token Vulnerability: A Technical Deep Dive
Comp sci and cyber securityDating apps hold a treasure trove of information about their users which...

Update Windows 10 Now to Block 'SMBGhost'
When even the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency is starting to get...

Here's Another Reason Using a Free Android VPN Is a Terrible Idea
There’s no such thing as a great free VPN. Or, rather, there’s only one free VPN...