Cyber Security

Cyber Security

Now you see a harmless PNG. Now it's a malicious payload. Look into my eyes A security bod scored a $100,500 bug bounty from Apple after discovering a vulnerability in Safari on macOS that could have been exploited by a malicious website to potentially access victims' logged-in online accounts...

Threat Intelligence

Threat Intelligence

This Metasploit module exploits an unauthenticated SQL injection vulnerability and a command injection vulnerability affecting the Grandstream UCM62xx IP PBX series of devices. The vulnerabilities allow an unauthenticated remote attacker to execute commands as root.

Technology

Technology

Credit: Pixabay When discovering and learning about the federal labs throughout the country, one will most likely stumble upon the phrase “tech transfer.” So, what exactly is tech transfer and why is it important to the general public? Tech transfer is a way to describe the overall...

Recently Added | Hourly updates!