X logo on a flare background
06
Jan
2024

X users fed up with constant stream of malicious crypto ads

Cybercriminals are abusing X advertisements to promote websites that lead to crypto drainers, fake airdrops, and other scams. Like all…

Google Chrome
06
Jan
2024

Malware abusing API is standard token theft, not an API issue

Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen…

Dolly.com pays ransom, attackers release data anyway
06
Jan
2024

Law firm Orrick data breach impacted 638,000 individuals

Law firm Orrick data breach impacted 638,000 individuals Pierluigi Paganini January 06, 2024 Law firm Orrick, Herrington & Sutcliffe disclosed…

23andMe Blames Users for Recent Data Breach as It's Hit With Dozens of Lawsuits
06
Jan
2024

23andMe Blames Users for Recent Data Breach as It’s Hit With Dozens of Lawsuits

It’s been nearly two years since Russia’s invasion of Ukraine, and as the grim milestone looms and winter drags on,…

mert tasci
06
Jan
2024

parameter pollution bug at twitter | by mert tasci

mert tasci · Follow 1 min read · Mar 11, 2023 — 1 Listen Share twitter sent an e-mail to…

Piercing the Veal: Short Stories to Read with Friends | by d0nut
06
Jan
2024

Piercing the Veal: Short Stories to Read with Friends | by d0nut

This feedback mechanism made me realize that this was more than a simple CRUD app and this service must be…

mert tasci
06
Jan
2024

a little open redirect bypass story | by mert tasci

in one private program at bugcrowd, i came across three different open redirect bug methods. firstthis is an effortless open…

My Year in Review — 2020. So | by d0nut
06
Jan
2024

My Year in Review — 2020. So | by d0nut

While terribly disappointed, I still had drive left in me to do well for myself and continue onward. At this…

[tl;dr sec] #212 - AWS Security Services Best Practices, EDR Bypass Lab, 100+ Vulnerable Practice Apps
06
Jan
2024

[tl;dr sec] #212 – AWS Security Services Best Practices, EDR Bypass Lab, 100+ Vulnerable Practice Apps

I hope you’ve been doing well! 👋 New Year, Who Dis? I hope you had a great holiday break and…

mert tasci
06
Jan
2024

xss attack vector at “style” context for less.js – mert tasci

detailless & sass suddenly came to my mind when researching about of css injection attacks. you know, both are css…

The Stony Path of Android 🤖 Bug Bounty – Bypassing Certificate Pinning
06
Jan
2024

The Stony Path of Android 🤖 Bug Bounty – Bypassing Certificate Pinning

Dear readers, Long story short, doing bug bounties for mobile devices is hard. With this article I want to show…

Alyssa Herrera
06
Jan
2024

High Risk Vulnerabilities within the DoD – Exploiting Coldfusion, Dotnet Nuke, Oracle, and more | by Alyssa Herrera

The Department of Defense Launched a bug bounty program on November 21st, 2016 on Hackerone. This allowed researchers to report…