Don't let mistakes bother you

If you don't care, you may become a victim of spam

GitBleed – Finding Secrets in Mirrored Git Repositories – CVE-2022-24975

Summary Due to a discrepancy in Git behavior, partial parts of a source code repository are […]

Insecure Bootstrap Process in Oracle Cloud CLI

Summary The bootstrap process for Oracle Cloud CLI using the “curl | bash” pattern was insecure […]

Three Reasons Why Log4J Is So Bad: Ubiquity, Severity and Exploitability

Over the last few weeks, security teams everywhere have been busy patching Log4J vulnerabilities. In this […]

WhatsApp for Android Retains Deleted Contacts Locally

Summary WhatApp for Android retains contact info locally after contacts get deleted. This would allow an […]

Recommendations for Parents about Cyber Bullying

Here are some dedicated tips for keeping younger children safe online. One of these training tips […]

WhatsApp, Facebook, Instagram server down in Pakistan?

Facebook-owned social media platforms, WhatsApp, Facebook, and Instagram are facing a worldwide outage, according to Downdetector, which […]

Open Redirect Vulnerability in Substack

Summary Substack had a open redirect vulnerability in their login flow which would have allowed an […]

Cloudflare reports record-breaking HTTP-request DDoS attack

Cloudflare reports thwarting the largest known HTTP-request distributed denial of service attack in history, approximately three […]

Speaking @Appsec_Village @DEFCON 29

Our talk titled “The Poisoned Diary: Supply Chain Attacks on Install Scripts” was accepted at this […]

Firebase CLI Installer Making Calls to Google Analytics

Firebase is a mobile and web application development platform provided by Google. One of the tools […]