Disclosing Vulnerability of CLink Office 2.0
Posted by chan chan on May 23 Dear Sir/Madam, I would like to submit a vulnerability found on CLink Office 2.0. I had contacted the...
[tool] tplink backup decryptor.
Posted by retset on May 23 Yet another "tool" to decrypt a backup configs for some tplink wifi routers. Only tested on latest fw for...
Mark Zuckerberg Sued Over Cambridge Analytica Data Breach
An investigation found Zuckerberg had lax oversight of users and created misleading privacy agreements Read More
UK’s Most Innovative Cyber SME 2022 Finalists Announced
DCMS announce 14 finalists of the UK's Most Innovative Cyber SME Competition Read More
A Practical Approach for Shifting Left
A practical approach to understanding shift left security and how shifting security left can help teams achieve DevSecOps success. As a critical part of DevSecOps,...
USN-5435-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could...
USN-5434-1: Firefox vulnerabilities
It was discovered that the methods of an Array object could be corrupted as a result of prototype pollution by sending a message to the...
USN-5433-1: Vim vulnerabilities
It was discovered that Vim incorrectly handled parsing of filenames in its search functionality. If a user were tricked into opening a specially crafted file,...
Forging Australian Driver’s Licenses
The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with...
Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago
Four years’ worth of records were accessed during the data breach Read More