NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin out their own servers imitating NordVPN. VPN providers are […]
Here’s a guide on how to prevent and protect yourself against the threat of hackers taking over your phone number and going after your online accounts.
tl;dr I found several bugs in apk, the default package manager for Alpine Linux. Alpine is a really lightweight distro that is very commonly used with Docker...
Hackers account for 90% of login attempts at online retailers
Hackers apply stolen data in a flood of login attempts, called "credential stuffing." They target bank accounts, airline miles, and even online grocery sites.
There are fundamental differences between OAuth 2.0 and OAuth 1.0a that Mastercard considers crucial for security OAuth 2.0 is designed for authorization only and could leave us vulnerable to account takeover / impersonation attacks OAuth 1.0a includes authentication and authorization, which our Mastercard Developers APIs need to process critically sensitive data
"Stylish" browser extension steals all your internet history | Robert Heaton
Before it became a covert surveillance tool disguised as an outstanding browser extension, Stylish really was an outstanding browser extension. It bestowed upon its users nothing less than the power to change the appearance of the internet. Its extensive bank of user-made skins gave bright websites a dark background, undid disliked UI changes, and added manga pictures to everything that wasn’t a manga picture already. I spent many wonderful hours in its simple CSS editor, hiding the distracting parts of the web whilst unknowingly being spied on. Facebook news feed...
17 Backdoored Docker Images Removed From Docker Hub
The Docker team has pulled 17 Docker container images that have been backdoored and used to install reverse shells and cryptocurrency miners on users' servers for the past year.
This cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.
Meltdown and Spectre Patching Has Been a Total Train Wreck
In the haste to address the Meltdown and Spectre vulnerabilities that shook the computer industry, several clumsy patch attempts have had to be pulled.