Author: Cybernoz
Created/Updated: September 7, 2022 In today’s standalone episode I’m going to talk about some new gaming ideas I’ve not seen…
Web properties are increasingly relying on third-party JavaScript to increase functionality, but this can also bring inherent risks. A report…
December 17th Update: Vulnerabilities in Log4j have been evolving over the course of this week since the original disclosure of…
On November 6th, 2019, Detectify added security tests for 50+ of the most popular WordPress plugins, including Easy-WP-SMTP. Although the…
Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group. The Canadian Yellow Pages Group has confirmed it…
Created/Updated: September 21, 2022 My mom died on Saturday. My biological mother became unable to function when I was around…
Service Location Protocol (SLP) is an older Internet protocol that has been found to contain a critical security flaw, which…
We take a look at a GuLoader campaign which comes bundled with an Italian language fake shipment email. GuLoader, a…
Common Weakness Enumeration (CWE) is a system to categorize software and hardware security flaws—implementation defects that can lead to vulnerabilities….
Kernel-mode Hardware-enforced Stack Protection is a security feature introduced in Windows 11 22H2 that protects systems from various memory attacks,…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Created/Updated: September 25, 2022 I’ve just started using Safari again after being on Chrome for a while, and one of…











