Running short on time but still want to stay in the know? Well, we’ve got you covered! We’ve condensed all the key takeaways into a handy audio summary. Our AI-driven podcasts are fit for on the g ...
Continue ReadingJune 19, 2025
Threat actors with suspected ties to Russia have been observed taking advantage of a Google account feature called application specific passwords (or app passwords) as part of a novel social engineeri ...
Continue ReadingJune 19, 2025
🌞Spring Into Summer Challenge: Critical Threats = Critical Rewards. 🌞 🔥 Now through August 4, 2025, earn 2X bounty rewards for all in-scope submissions from our ‘High Threat’ list in soft ...
Continue ReadingJune 18, 2025
Hidden Malware Discovered in jQuery Migrate: A Stealthy Supply Chain Threat By Trishaan Kalra · June 18, 2025 Introduction What happens when a trusted open source library becomes a conduit for stealt ...
Continue ReadingJune 18, 2025
Impact When an authd user who hasn't logged in to the system before (i.e. doesn't exist in the authd user database) logs in via SSH, the user is considered a member of the root group in the ...
Continue ReadingJune 16, 2025
PingFederate OAuth2 grant duplication in PostgreSQL persistent storage allows OAuth2 requests to use excessive memory...Read More ...
Continue ReadingJune 16, 2025
PingFederate OAuth2 grant duplication in PostgreSQL persistent storage allows OAuth2 requests to use excessive memory...Read More ...
Continue ReadingJune 15, 2025
PingFederate OAuth2 grant duplication in PostgreSQL persistent storage allows OAuth2 requests to use excessive memory...Read More ...
Continue ReadingJune 15, 2025
Back to Main