I recently worked on a small toy project to execute untrusted Python code in Docker containers. This lead me to test several...
A staggering 8,000 vulnerabilities have been discovered in one of the most widespread medical advancements keeping people alive today: The pacemaker. White...
Vulnerability defined as the weakness that allows attacker to enter in and harm, it may be a flaw in design or misconfiguration....
IBM Informix Dynamic Server and Informix Open Admin Tool contains 6 Critical Vulnerabilities including RCE and a Buffer overflow in HEAP. IBM Informix...
Burp Suite is a graphical tool for testing Web application security. The tool is composed in Java and created by PortSwigger Security....
Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security vulnerabilities in...
Cyber security experts disclosed the existence of 10 unpatched security flaws in dozens of Linksys routers widely used today. The IOActive senior...
Welcome back, in this tutorial you will learn how to scan and fingerprint a web server or device to find vulnerabilities. To...
Microsoft today patched a zero-day Word vulnerability that has been publicly attacked along with deploying fixes for Internet Explorer, Microsoft Edge and...
Riverbed Technology has patched four serious vulnerabilities in its SteelCentral portal, a centralized application performance monitoring platform. The flaws could allow an...
Owners of Android and iOS devices should pay special attention to security updates released by Google and Apple on Monday, as they...
Experts at Cylance disclosed two UEFI flaws that can be exploited by attackers to install a backdoor on some Gigabyte BRIX mini...
Earlier this month, we teased a proof of concept for UEFI ransomware, which was presented at RSA Conference 2017. The HackingTeam, Snowden,...
The SySS Radio Hack Box is a proof-of-concept software tool to demonstrate the replay and keystroke injection vulnerabilities of the wireless keyboard...
SQL Inject Me is a Firefox addon created by Security Compass it is used for finding SQL vulnerabilities in Web applications. SQL...
Drupal is a content management software. It’s utilized to make a considerable amount of the websites and applications you utilize each day....
Shorebreak Security penetration testers discovered seven serious vulnerabilities in the dnaLIMS web application during the course of a blackbox penetration test for...
For the last couple of year, Google has been releasing details about unpatched vulnerabilities discovered by its researchers in Microsoft’s products. Now,...
As I said on my previous article, being a penetration tester makes us feel like a group of traveler. Today, I would...
Chinese router maker TP-Link is wrestling with the disclosure of a handful of vulnerabilities in its C2 and C20i routers. The most...
In this blog post I disclose two vulnerabilities in the OnePlus 3/3T bootloader. The first one, CVE-2017-5626, is a critical severity vulnerability...