Intel Fixes Dangerous Plundervolt Vulnerability

Intel has quickly released a fix for the new and already infamous Plundervolt vulnerability found in Intel 6th, 7th, 8th, 9th, and 10th generation processors, alongside Xeon Processor E3 v5 and v6, and Xeon Processor E-2100 and E-2200. Security researc… Continue reading Intel Fixes Dangerous Plundervolt Vulnerability

25 Most Dangerous Software Errors List Shows SQL Injections Dropping in Frequency

The top 25 most dangerous errors found in the CVE repositories were just published, and they show some interesting and surprising trends over the past decade. The first place in the Top 25 Most Dangerous Software Errors listed by the Common Weakness En… Continue reading 25 Most Dangerous Software Errors List Shows SQL Injections Dropping in Frequency

Don’t Forget to Pack a USB Condom When Traveling

The only way to prevent juice jacking is to use a USB condom, which is not as crazy as it might sound. Hackers are looking for new ways to compromise people’s computers, and one way is through public USB ports. You’re in a hurry, you’… Continue reading Don’t Forget to Pack a USB Condom When Traveling

Microsoft Finds 44 Million Compromised Credentials Used for Its Services

Microsoft’s identity threat research team found more than 44 million compromised Microsoft user accounts in use in three months of scanning, between January and March 2019. The team checked billions of credentials people use for their services in… Continue reading Microsoft Finds 44 Million Compromised Credentials Used for Its Services

Windows Hello for Business Affected by Serious Vulnerability; Microsoft Issues Advisory

Microsoft issued an advisory regarding Windows Hello for Business (WHfB) and its implementation within Active Directory, as public keys remain accessible even when the device is removed from Active Directory.
The post Windows Hello for Business Af… Continue reading Windows Hello for Business Affected by Serious Vulnerability; Microsoft Issues Advisory

HackerOne Bug Bounty Website Hacked

A hacker managed to compromise HackerOne, a company that itself pays white hat hackers to find security breaches for other companies. The hacker, identified only by the pseudonym haxta4ok00, figured out a way to compromise the HackerOne website and gai… Continue reading HackerOne Bug Bounty Website Hacked