Chromium site isolation bypass allows wide range of attacks on browsers
Flaw that opened the door to cookie modification and data theft resolved [...]
Flaw that opened the door to cookie modification and data theft resolved [...]
Harbor, Traefik, and Skipper projects tackle unsafe URL parsing methods [...]
Bug Bounty Switzerland AG awarded program management contract [...]
‘We believe that announcing vulnerabilities without a fix is the best solution for a difficult problem’ [...]
Evolution CMS, FUDForum, and GitBucket vulnerabilities chained for maximum impact [...]
Security chief counts new build system and greater intel sharing among positive legacies of watershed cyber-attack [...]
Security issue fixed in version 22.1.1 of file transfer software [...]
Malicious builds and wider infrastructural compromise were worst-case scenarios [...]
Reflected XSS and DOM-based XSS bugs net researchers $3,000 and $5,000 bug bounties [...]
New web targets for the discerning hacker [...]
New features also include ability to connect social media accounts [...]
Initiative adds another layer of protection for end-to-end identity verification platform [...]
Attack vector cost businesses 2.5% more in one year [...]
Security release also includes precautionary patches for potential Log4j-like flaw in Logback library [...]
‘Vast majority’ of users have updated systems thanks to vendor warnings [...]
Maintainers warn to patch all versions of open source web app framework – even those not deemed vulnerable [...]
The fax is dead. Long live the online fax? A new study suggests many healthcare professionals believe that flaws in today’s web security landscape are prompting a return to what’s been deemed an “extr [...]
Inadequate access control and CSRF protections spawn critical and high severity issues [...]
New research shows how deep learning models trained for network intrusion detection can be bypassed [...]
Open source security expert warns there is still a ‘long road’ ahead to prepare for the next attack wave [...]
Severity of code execution bug mitigated by ‘high uptake’ of previous patch [...]
Open source analytics platform fixes bug that could lead to authentication bypass, privilege escalation [...]
Jira, Bamboo, Bitbucket, Confluence, Fisheye/Crucible, and Questions for Confluence affected [...]
Unauthenticated SQL injection bugs put thousands of WordPress sites under threat [...]
Broader architectural failings of Chinese vendor potentially puts 1.5m devices at risk [...]