Author: Cybernoz
December 17th Update: Vulnerabilities in Log4j have been evolving over the course of this week since the original disclosure of…
On November 6th, 2019, Detectify added security tests for 50+ of the most popular WordPress plugins, including Easy-WP-SMTP. Although the…
Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group. The Canadian Yellow Pages Group has confirmed it…
Created/Updated: September 21, 2022 My mom died on Saturday. My biological mother became unable to function when I was around…
Service Location Protocol (SLP) is an older Internet protocol that has been found to contain a critical security flaw, which…
We take a look at a GuLoader campaign which comes bundled with an Italian language fake shipment email. GuLoader, a…
Common Weakness Enumeration (CWE) is a system to categorize software and hardware security flaws—implementation defects that can lead to vulnerabilities….
Kernel-mode Hardware-enforced Stack Protection is a security feature introduced in Windows 11 22H2 that protects systems from various memory attacks,…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Created/Updated: September 25, 2022 I’ve just started using Safari again after being on Chrome for a while, and one of…
CNMF commander William Hartman US Army, CNMF The United States is sending more of its cyber forces abroad to help…
For the fifth year in a row, HackerOne published a report that provides insights from the world’s largest database of…