Using ngrok to proxy internal servers in restrictive environments
27
Mar
2023

Using ngrok to proxy internal servers in restrictive environments

November 18, 2015 · security ngrok pentesting When gaining shell access to a machine on a network, a promising attack…

Pwn2Own
27
Mar
2023

Hackers earn $1,035,000 for 27 zero-days exploited at Pwn2Own Vancouver

Pwn2Own Vancouver 2023 has ended with contestants earning $1,035,000 and a Tesla Model 3 car for 27 zero-day (and several…

Lords AI weapons committee holds first evidence session
27
Mar
2023

Lords AI weapons committee holds first evidence session

The potential benefits of using artificial intelligence (AI) in weapons systems and military operations should not be conflated with better…

Penetrating PornHub - XSS vulns galore (plus a cool shirt!)
27
Mar
2023

Penetrating PornHub – XSS vulns galore (plus a cool shirt!)

When PornHub launched their public bug bounty program, I was pretty sure that most of the low hanging fruits of…

Hackers Exploited Critical Microsoft Outlook Vulnerability
27
Mar
2023

Hackers Exploited Critical Microsoft Outlook Vulnerability

In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide for its customers to help…

A bug revealed ChatGPT users' chat history, personal and billing data
27
Mar
2023

A bug revealed ChatGPT users’ chat history, personal and billing data

A vulnerability in the redis-py open-source library was at the root of last week’s ChatGPT data leak, OpenAI has confirmed….

MacStealer macOS Malware
27
Mar
2023

New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords

Mar 27, 2023Ravie LakshmananData Safety / Endpoint Security A new information-stealing malware has set its sights on Apple’s macOS operating…

CBI launches campaign to boost UK tech unicorns
27
Mar
2023

CBI launches campaign to boost UK tech unicorns

The Confederation of British Industry (CBI) has launched a campaign to bolster support for the UK’s most innovative high-growth tech…

Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts | Sam Curry
27
Mar
2023

Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts | Sam Curry

Over the last few years, usage of vulnerability disclosure and bug bounty programs have increased significantly. It is now almost…

Latitude Financial Data Breach: 14 Million Customers Affected
27
Mar
2023

Latitude Financial Data Breach: 14 Million Customers Affected

The Australian consumer lender, Latitude Financial, has suffered a major cyber attack, leading to a data breach of passport and…

BEC scammers are after physical goods, the FBI warns
27
Mar
2023

BEC scammers are after physical goods, the FBI warns

BEC attacks are usually aimed at stealing money or valuable information, but the FBI warns that BEC scammers are increasingly…

SaaS
27
Mar
2023

Where SSO Falls Short in Protecting SaaS

Mar 27, 2023The Hacker NewsSaaS Security Single sign-on (SSO) is an authentication method that allows users to authenticate their identity…