Breaking Down the Benefits of Hacker-Powered Pen Tests
30
May
2023

New Ways to Use HackerOne

We are on a mission to empower the world’s hackers and security teams to fix software vulnerabilities together. Since HackerOne…

WordPress
30
May
2023

WordPress plugin ‘Gravity Forms’ vulnerable to PHP object injection

The premium WordPress plugin ‘Gravity Forms,’ currently used by over 930,000 websites, is vulnerable to unauthenticated PHP Object Injection. Gravity…

SimpleTire Database Leak: Over 2.8 Million Records Exposed
30
May
2023

Over 2.8 Million Records Exposed

The exposed database contained a staggering 2,808,697 records, amounting to a massive 1 Terabyte in size. On May 29th, 2023,…

Go Phish: How Attackers Utilize HTML Files to Evade Security
30
May
2023

Go Phish: How Attackers Utilize HTML Files to Evade Security

By Motti Elloul, VP Customer Success and Incident Response, Email phishing scams are nothing new. But they are growing increasingly…

Breaking Down the Benefits of Hacker-Powered Pen Tests
30
May
2023

Bug Bounty 5 Years In

This post by Collin Greene originally appeared on Medium on June 15, 2016. In my first few months at Facebook…

Barracuda
30
May
2023

Barracuda zero-day abused since 2022 to drop new malware, steal data

Image: Bing Image Creator Network and email security firm Barracuda today revealed that a recently patched zero-day vulnerability had been…

No. 384 World AI Coin, Russian Power Attacks, Guidance AI Workflow…
30
May
2023

No. 384 World AI Coin, Russian Power Attacks, Guidance AI Workflow…

*|INTERESTED:Memberful Plans:UL Subscription (Annual) (53074)|* *|END:INTERESTED|* *|INTERESTED:Memberful Plans:UL Subscription (Annual) (53074)|**|ELSE:|* *|END:INTERESTED|* Unsupervised Learning is a Security, AI, and Meaning-focused…

Tenet and LayerZero Forge Cross-Chain LSD Adoption
30
May
2023

Tenet and LayerZero Forge Cross-Chain LSD Adoption

The partnership will see Tenet, a blockchain built on the Cosmos SDK, leverage the LayerZero omnichain framework to secure connections…

The Rush to SaaS Modernization Can Result in Reputational Damage
30
May
2023

The Rush to SaaS Modernization Can Result in Reputational Damage

By Hananel Livneh, Head of Product Marketing, Successful cyberattacks tend to hit companies with the force of an 80-foot wave….

Apple
30
May
2023

Microsoft finds macOS bug that lets hackers bypass SIP root restrictions

Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install “undeletable”…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
30
May
2023

What Was It Like To Hack the Pentagon?

Click here for our main Hack the Pentagon page What Was It Like To Hack the Pentagon? The U.S. Federal…

Hacker
30
May
2023

RomCom malware spread via Google Ads for ChatGPT, GIMP, more

A new campaign distributing the RomCom backdoor malware is impersonating the websites of well-known or fictional software, tricking users into…