Hacker community jumps on hilarious Twitter meme mocking bad infosec advice from CISOs
Satirical hot takes from non-technical position holders [...]
Satirical hot takes from non-technical position holders [...]
Security bug in the popular workspace app has been patched [...]
Industry breathes a sigh of relief as legal threat recedes [...]
Vulnerabilities could allow an attacker to execute commands with unrestricted privileges [...]
$13,000 banked through scan and exploit attack methodology [...]
Popular online shopping platform is offering up to $10k for ‘max critical’ vulnerabilities [...]
Researcher earns $3,000 bug bounty after compromising Facebook accounts on screen-locked devices [...]
Top tips on thwarting data breaches, ransomware, and more from infosec experts [...]
Polish gaming company reported security incident to multiple law enforcement agencies [...]
SIP devices could become unwitting access points for remote attacks on critical systems [...]
Attacks ‘aimed at accessing, disrupting, and controlling’ news platform thwarted [...]
Concerns have been raised that the DWF project is causing “confusion” in the community [...]
Conference room hardware hack symptomatic of more general malaise, warn security researchers [...]
Privacy add-ons uBlock Origin and AdGuard are among the affected apps [...]
Funds represent a ‘significant portion’ of proceeds for those behind critical infrastructure attack [...]
Board members offer a behind-the-scenes look at the non-profit [...]
Patched finally issued following difficult triage and disclosure process [...]
Bug bounty vendor Bugcrowd to oversee the project [...]
Bug bounty vendor Bugcrowd to oversee the project [...]
Coding platforms explicitly permits proof of concept exploits [...]
Users urged to migrate to alternative application, with open source project long since abandoned [...]
Users of the Mailman newsletter management service should patch now [...]
The feature can be used to automatically switch from HTTP to HTTPS [...]
Security flaws could allow attackers unauthorized access [...]
Ethical hackers frequently report security flaws outside of VDPs – often to no avail [...]