Exploiting Custom Template Engines
Introduction When performing an application assessment one of the areas within an app I pay particular attention to is any ability to define custom templates. By this I mean functionalityRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
Introduction When performing an application assessment one of the areas within an app I pay particular attention to is any ability to define custom templates. By this I mean functionalityRead More →
Hole made it possible to trick users into double spending and hack smart contracts. Developers of Ethereum, the world’s No. 2 digital currency by market capitalization, have closed a seriousRead More →
Data protected by Intel’s Software Guard Extensions could be open to a new side-channel attack. According to cyber security experts, a new variant of the Spectre attack on devices that use IntelRead More →
An additional 2.4 million Americans have been identified as victims of the company’s 2017 breach. Equifax has confirmed more Americans are impacted by the cyberattack that targeted the credit ratingRead More →
Another AWS Bucket exposed to the public. This time the AWS Bucket belonged to Birst. A cyber security team have discovered a massive trove of data exposed due to anRead More →
Memcached is a distributed system that allows the caching of information in RAM. This software seeks to accelerate the search and access to information. Instead of going to the disk,Read More →
Recently Facebook patched an information disclosure vulnerability that exposed page administrators, cyber security researcher Mohamed Baset reported this week. Baset claimed he discovered the issue, which he described as a “logical error,”Read More →
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t beRead More →
Android P, the next major version of Android, could be weeks away from an official unveiling, and although its core user-facing features are still unknown to us, we are discovering many little tidbits thanksRead More →
Card-Not-Present fraud is still a problem, however. The US began its transition to chip-based credit cards in earnest in October 2015, after high-profile credit card hacks in the previous years atRead More →