Researchers discover Log4j-like flaw in H2 database console
Impact of JNDI bug mitigated by vulnerable behavior being disabled by default [...]
Impact of JNDI bug mitigated by vulnerable behavior being disabled by default [...]
Quartet of software flaws addressed ahead of next major release of popular CMS [...]
Buffer overflow flaw should be patched immediately [...]
Trust boundaries breached by security shortcomings [...]
Bureau of Internet and Technology helped affected organizations secure accounts and bolster defenses [...]
This isn’t the first time the landlocked nation has restricted web access for citizens [...]
Cloud storage misconfiguration left sensitive data openly accessible [...]
Alleged misuse of bug bounty and failure to disclose breach leads to criminal charges [...]
Attackers leverage software supply chain to compromise high-traffic sites [...]
Researcher claims he found RCE, authentication bypass, CSRF flaws [...]
Payment system updated amidst fears 200,000 records may have been exposed [...]
We take a look at the latest additions to security researchers’ armory [...]
Targets included GitHub, GitLab, HackerOne, and Cloudflare [...]
Kudos to Tonga’s ccTLD, the US Supreme Court, and others... [...]
Déjà vu isn't what it used to be [...]
New web targets for the discerning hacker [...]
Disclosure process for bugs in HCL DX – formerly WebSphere Portal – seemingly went awry [...]
Disclosure process for bugs in HCL DX – formerly WebSphere Portal – initially went awry [...]
Key thinkers on the biggest security stories and trends in 2021 [...]
Key thinkers on the biggest security stories and trends in 2021 [...]
Password vault investigation reveals no evidence of credential stuffing activity [...]
Credit card storage rules and 72-hour breach notification deadline due to come into play next year [...]
On the 12th Day of Swigmas, The Daily Swig gave to me... [...]
A dozen teams competed in cloud, IoT, OSINT, forensics, and machine learning challenges [...]
Malicious actors could wreak havoc by impersonating legitimate websites [...]