Hackerone logo
25
Jan
2025

A Partial Victory for AI Researchers

HackerOne has partnered with security and AI communities to advocate for stronger legal protections for independent researchers. Most recently, HackerOne…

U.S. CISA adds JQuery flaw to its Known Exploited Vulnerabilities catalog
25
Jan
2025

U.S. CISA adds JQuery flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds JQuery flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 23, 2025 U.S. Cybersecurity and Infrastructure…

Hackerone logo
25
Jan
2025

Introducing Lightspark’s Public Bug Bounty Program

Expanding Our Bug Bounty Program At Lightspark, we’ve always been focused on security that meets and exceeds industry standards. We’ve…

U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog
25
Jan
2025

U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 24, 2025 U.S. Cybersecurity and…

Zyxel Firewalls
25
Jan
2025

Zyxel warns of bad signature update causing firewall boot loops

Zyxel is warning that a bad security signature update is causing critical errors for USG FLEX or ATP Series firewalls, including putting…

Hackerone logo
24
Jan
2025

Resurrecting Shift-Left With Human-in-the-loop AI

What’s Needed for Secure by Design Success We spent years understanding the culprits of why “shift-left” controls fail to identify…

Windows
24
Jan
2025

Microsoft to deprecate WSUS driver synchronization in 90 days

Microsoft has reminded Windows administrators that driver synchronization in Windows Server Update Services (WSUS) will be deprecated on April 18,…

J-magic malware campaign targets Juniper routers
24
Jan
2025

J-magic malware campaign targets Juniper routers

J-magic malware campaign targets Juniper routers Pierluigi Paganini January 24, 2025 Threat actors are targeting Juniper routers with a custom…

Hackerone logo
24
Jan
2025

Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs

Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace. This past year, breaches resulting…

US indicts five in fake North Korean IT contractor scandal
24
Jan
2025

US indicts five in fake North Korean IT contractor scandal

The United States Department of Justice (DoJ) has announced the indictment of five men – two North Koreans, a Mexican…

Hackers use Windows RID hijacking to create hidden admin account
24
Jan
2025

Hackers use Windows RID hijacking to create hidden admin account

A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account…

US Charges Five in North Korean IT Worker Hiring Scam
24
Jan
2025

US Charges Five in North Korean IT Worker Hiring Scam

US prosecutors charged five, including North Koreans, for tricking firms into hiring fake IT workers, sending $866K+ to fund weapons…