Hackerone logo
21
May
2024

Community-driven PTaaS vs. Automated Pentesting

Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However,…

Critical GitHub Enterprise Server Flaw Allowed Attackers to Bypass Authentication
21
May
2024

GitHub Enterprise Server Flaw Allow Bypass Authentication

A critical vulnerability was discovered in the GitHub Enterprise Server that could allow attackers to completely bypass authentication and gain…

Akira Ransomware Privilege
21
May
2024

Critical Memory Corruption In Cloud Logging  Infrastructure

Fluent Bit, a widely used open-source data collector and processor, has been found to have a major memory loss flaw….

NextGen Healthcare Mirth
21
May
2024

NextGen Healthcare Mirth Connect Under Attack

May 21, 2024NewsroomHealthcare / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting…

Secretforums BreachNation USDoD Baphomet
21
May
2024

Secretforums & Breach Nation Lure Ex-BreachForums Members

Secretforums, a data leaks forum, announced that it would bestow former BreachForums members with ranks similar to what they had…

Akira Ransomware Privilege
21
May
2024

PoC Exploit Released for QNAP QTS zero-day RCE Flaw

Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system…

Fluent Bit Vulnerability
21
May
2024

“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit

May 21, 2024NewsroomCyber Attack / API Security Cybersecurity researchers have discovered a critical security flaw in a popular logging and…

Kansas City Cyberattack Shuts Down KC Scout Camera Systems
21
May
2024

Kansas City Cyberattack Shuts Down KC Scout Camera Systems

Kansas City faced significant disruptions following a cyberattack, particularly affecting its crucial KC Scout camera system, which monitors Metro highways….

Hackerone logo
21
May
2024

What Is a Business Logic Vulnerability? [Example]

It sounds straightforward enough, but business logic vulnerabilities can result in an array of serious security issues, such as unauthorized…

UK Researchers Find AI Chatbots Highly Vulnerable to Jailbreaks
21
May
2024

UK Researchers Find AI Chatbots Highly Susceptible to Jailbreaks

Advanced AI Safety Institute (AISI) researchers have recently discovered substantial vulnerabilities in popular AI chatbots, indicating that these systems are…

AnyDesk hit by ransomware and Cloudflare hacked
21
May
2024

USA initiates $50m incentive program to thwart ransomware threats

In a groundbreaking move, the US Department of Health and Human Services (HHS) has introduced a $50 million initiative aimed…

Western Sydney Uni discloses January
21
May
2024

Western Sydney Uni discloses January “IT network” breach – Cloud – Security

Western Sydney University has disclosed a breach of its “IT network” from January that it has linked to an earlier…