Security asset management should be buttoned down. It isn’t.
I’ve been writing recently about security hygiene and posture management. In January, I declared that security hygiene and posture management would become a priority in...
High Severity WordPress Plugin Bug Hits Three Million
Vulnerability could enable threat actors to access backups Read More
CVE-2020-8107
A Process Control vulnerability in ProductAgentUI.exe as used in Bitdefender Antivirus Plus allows an attacker to tamper with product settings via a specially crafted DLL...
Stop pixelating! New tool reveals the secrets of “redacted” documents
A new tool makes crystal clear that it's a big mistake to redact text by pixelating it.. or indeed blurring it, or even applying a...
FlexBooker Data Leak Impacts Millions of End Customers
Researchers find misconfigured AWS S3 bucket Read More
ZDI-22-378: ICONICS GENESIS64 DWG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that...
ZDI-22-379: (Pwn2Own) Samsung Galaxy S21 Open Redirect Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 phones. User interaction is required to exploit this vulnerability...
ZDI-22-380: (Pwn2Own) Samsung Galaxy S21 Improper Error Handling Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 phones. User interaction is required to exploit this vulnerability...
ZDI-22-381: Microsoft Outlook for Mac Hyperlink UI Misrepresentation Vulnerability
This vulnerability allows remote attackers to disguise the target of hyperlinks on affected installations of Microsoft Outlook for Mac. User interaction is required to exploit...
ZDI-22-382: Lexmark MC3224i PostScript Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark MC3224i printers. Authentication is not required to exploit this vulnerability. Read...