We’re going teetotal: It’s goodbye to The Daily Swig
PortSwigger today announces that The Daily Swig is closing down [...]
PortSwigger today announces that The Daily Swig is closing down [...]
New web targets for the discerning hacker [...]
Armed with personal data fragments, a researcher could also access 185 million citizens’ PII [...]
The second part of our password manager series looks at business-grade tech to handle API tokens, login credentials, and more [...]
Protections against cross-site request forgery could be bypassed [...]
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news [...]
CSF 2.0 blueprint offered up for public review [...]
Patch released for bug that poses a critical risk to vulnerable technologies [...]
JFrog argues vulnerability risk metrics need complete revamp [...]
API security is a ‘great gateway’ into a pen testing career, advises specialist in the field [...]
Exploitation could enable attackers to access backend servers [...]
Free fortnightly roundup and exclusive content for subscribers only [...]
New legal protections for security researchers could be the strongest of any EU country [...]
Possible RCE and denial-of-service issue discovered in Kafka Connect [...]
The first guide of our two-part series helps consumers choose the best way to manage their login credentials [...]
Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news [...]
Single sign-on and request smuggling to the fore in another stellar year for web security research [...]
No response or patch yet forthcoming from providers of vulnerable document management systems [...]
Anonymized numbers of bug discoveries swiftly deleted after pushback [...]
Campaigner bemoans glacial progress of review and urges government to set clear timetable [...]
Web attack vector closed after failed fix [...]
Hacker praises carmaker’s prompt response to the (mercifully) good-faith pwnage [...]
Plan to create boundary between JavaScript objects and their blueprints gathers momentum [...]
Path traversals could ‘void reverse engineering efforts and tamper with evidence collected’ [...]
Popular hacking aid resurrected following end-of-life announcement [...]