Pwn2Own Day 1 and 2: Samsung, HP, MikroTik & Netgear Pwned

By Habiba Rashid
Here is everything you need to know about the first two days at the Pwn2Own hacking contest.
This is a post from HackRead.com Read the original post: Pwn2Own Day 1 and 2: Samsung, HP, MikroTik & Netgear Pwned
Continue reading Pwn2Own Day 1 and 2: Samsung, HP, MikroTik & Netgear Pwned

NETGEAR Router Vulnerability Allowed Access to Restricted Services

By Deeba Ahmed
According to Tenable research, NETGEAR had to release last-minute patches for their devices that were a part of the Pwn2Own event.
This is a post from HackRead.com Read the original post: NETGEAR Router Vulnerability Allowed Access to R… Continue reading NETGEAR Router Vulnerability Allowed Access to Restricted Services

NETGEAR Router Vulnerability Allowed Access to Restricted Services

By Deeba Ahmed
According to Tenable research, NETGEAR had to release last-minute patches for their devices that were a part of the Pwn2Own event.
This is a post from HackRead.com Read the original post: NETGEAR Router Vulnerability Allowed Access to R… Continue reading NETGEAR Router Vulnerability Allowed Access to Restricted Services

Hacker Leaks 5.3M Twitter Accounts as Claims of Larger Breach Surface

By Habiba Rashid
A hacker has leaked 5.3 million Twitter account details on a cybercrime forum while another researcher, Chad Loder, claims there is another Twitter breach involving “perhaps over 100 million accounts.”
This is a post from HackRead.com … Continue reading Hacker Leaks 5.3M Twitter Accounts as Claims of Larger Breach Surface

How to reproduce following POC of dom based open redirection Vulnerability Flagged by burp suite scan

During scan, the burp suite flagged DOM open redirection vulnerability with the following POC. How can I reproduce it?
Data is read from document.referrer and passed to xhr.send.
The following value was injected into the source:
https://ww… Continue reading How to reproduce following POC of dom based open redirection Vulnerability Flagged by burp suite scan

Google invites bug hunters to scrutinize its open source projects

Google wants to improve the security of its open source projects and those projects’ third-party dependencies by offering rewards for bugs found in them. “Depending on the severity of the vulnerability and the project’s importance, rewards … Continue reading Google invites bug hunters to scrutinize its open source projects

Google Introduces Bug Bounty Program for Open-Source Software

By Deeba Ahmed
Through the bug bounty program, ethical hackers will get rewards ranging from $100 – $31,337, depending on their discovered bug’s severity.
This is a post from HackRead.com Read the original post: Google Introduces Bug Bounty Program for… Continue reading Google Introduces Bug Bounty Program for Open-Source Software