‘Cybersecurity incident’ at Ubisoft disrupts operations

Lapsu$ threat actors have been linked to the cyber-attack | Continue reading


@portswigger.net | 2 years ago

Prison service for England and Wales recorded more than 2k data breaches over

Ministry of Justice said information commissioner ‘satisfied’ with response to one particularly contentious breach | Continue reading


@portswigger.net | 2 years ago

Stats widget hacked in attempt to breach Russian government agency websites

The software was reportedly used as part of a short-lived software supply chain attack | Continue reading


@portswigger.net | 2 years ago

Exploit chain allows security researchers to pwn phone system

Cloudy with a chance of exploits | Continue reading


@portswigger.net | 2 years ago

Zero-day XSS vulnerability in Horde webmail client can be triggered by

Researchers release details of unpatched security flaw | Continue reading


@portswigger.net | 2 years ago

Critical vulnerabilities in Zabbix Web Front end allow authentication bypass

Patch now to protect, say researchers | Continue reading


@portswigger.net | 2 years ago

Lagging behind? New study highlights weaknesses in open source patch process

Patch delays create a ‘window of opportunity’ for observant attackers | Continue reading


@portswigger.net | 2 years ago

Port of LA’s new Cyber Resilience Center aims to bolster physical and digital

‘We must take every precaution against potential cyber incidents’, port director tells The Daily Swig | Continue reading


@portswigger.net | 2 years ago

MFA fatigue attacks: Users tricked into allowing device access due to overload

Social engineering technique confuses victims to gain entry to their accounts | Continue reading


@portswigger.net | 2 years ago

Poisoned pipelines: Security researcher explores attack methods in CI

Attack vector abuses permissions to force CI pipelines to execute arbitrary commands | Continue reading


@portswigger.net | 2 years ago

HTTP/3: Everything you need to know about the next-generation web protocol

QUIC march | Continue reading


@portswigger.net | 2 years ago

Google Project Zero hails dramatic acceleration in security bug remediation

Researchers credit greater transparency and responsible disclosure policies for improvements in the patching process | Continue reading


@portswigger.net | 2 years ago

Nintendo Switch hacker sent behind bars, owes video game giant further $4.5m

Underground business sold jailbreak devices for consoles including the Nintendo Switch, 3DS, and Microsoft’s Xbox | Continue reading


@portswigger.net | 2 years ago

Bowser’s jury: Nintendo Switch hacker sent behind bars, owes video game giant

Underground business sold jailbreak devices for consoles including the Nintendo Switch, 3DS, and Microsoft’s Xbox | Continue reading


@portswigger.net | 2 years ago

Tool trio released to protect JavaScript applications from malicious NPM

Security tools inspired by recent case where a package maintainer went rogue | Continue reading


@portswigger.net | 2 years ago

Cryptocurrency firm MakerDAO offers record $10m in newly launched bug bounty

Chance to become an instant multimillionaire via flaws in DAI smart contracts, websites, and apps | Continue reading


@portswigger.net | 2 years ago

Dependency confusion tops the PortSwigger annual web hacking list for 2021

Request smuggling attacks a key theme | Continue reading


@portswigger.net | 2 years ago

Cyber-attack at Vodafone Portugal knocks mobile network services offline

No customer data was accessed, company claims | Continue reading


@portswigger.net | 2 years ago

Top web hacking techniques of 2021

Welcome to the Top 10 (new) Web Hacking Techniques of 2021, the latest iteration of our annual community-powered effort to identify the most significant web security research released in the last year | Continue reading


@portswigger.net | 2 years ago

FTC set to ramp up privacy and security rule-making activity in 2022

Recent moves from the US government agency have laid the groundwork for significant changes to businesses’ compliance obligations, writes US attorney David Oberly | Continue reading


@portswigger.net | 2 years ago

Email platform Zimbra issues hotfix for XSS vulnerability under active

Attackers have targeted mailboxes ‘in multiple waves across two attack phases’ | Continue reading


@portswigger.net | 2 years ago

Vulnerabilities in Cisco Small Business routers could allow unauthenticated

Critical security bugs inherited by multiple products | Continue reading


@portswigger.net | 2 years ago

Open Source Security Foundation launches new initiative to stem the tide of

Alpha-Omega Project aims to improve software supply chain security for 10,000 OSS projects | Continue reading


@portswigger.net | 2 years ago

Bittersweet Symfony: Devs accidentally turn off CSRF protection in PHP framework

Inadvertent defense downgrade quickly reverted | Continue reading


@portswigger.net | 2 years ago

SnapFuzz: New fuzzing tool speeds up testing of network applications

Though still in its early stages, SnapFuzz is already showing some promising results | Continue reading


@portswigger.net | 2 years ago

Serious Vulnerability in WordPress Plugin Essential Addons for Elementor

WordPress plugin problem patched | Continue reading


@portswigger.net | 2 years ago

Fastly patches memory leak HTTP/3 vulnerability in H2O HTTP server project

‘Cloudbleed’-like bug affected cloud computing service from Fastly, a H2O contributor | Continue reading


@portswigger.net | 2 years ago

British Council data breach leaks 10k student records

Researchers say 144,000 files were exposed | Continue reading


@portswigger.net | 2 years ago

Critical Samba flaw presents code execution threat

Urgent patching of file-sharing technology urged | Continue reading


@portswigger.net | 2 years ago

Bug Bounty Radar // The latest bug bounty programs for February

New web targets for the discerning hacker | Continue reading


@portswigger.net | 2 years ago

Apple pays out $100k bounty for Safari webcam hack that imperiled victims’

Gatekeeper defenses prove no match for uXSS attack | Continue reading


@portswigger.net | 2 years ago

Tor Project heads to Russian court to appeal against censorship

Volunteers urged to build bridges while Tor contests blockade | Continue reading


@portswigger.net | 2 years ago

Same-origin violation vulnerability in Safari 15 could leak a user’s website

Fix is apparently incoming | Continue reading


@portswigger.net | 2 years ago

Researcher discovers 70 web cache poisoning vulnerabilities, nets $40k in bug

Targets included GitHub, GitLab, HackerOne, and Cloudflare | Continue reading


@portswigger.net | 2 years ago

Wireless coexistence – New attack technique exploits Bluetooth, WiFi performance

Attackers can use connections between wireless chips to steal data or credentials, researchers find | Continue reading


@portswigger.net | 2 years ago

US clothing supplier Pro Wrestling Tees hit by data breach

Law enforcement alerted company to compromise of payment card info | Continue reading


@portswigger.net | 2 years ago

Anti-cheating browser extension fails web security examination

XSS flaw in Proctorio gets resolved | Continue reading


@portswigger.net | 2 years ago

Security researcher earns plaudits after discovering Yandex SSRF flaw

Russian language search engine has secured its backend infrastructure | Continue reading


@portswigger.net | 2 years ago

Ukraine hosts large-scale simulation of cyber-attack against energy grid

SANS Institute’s latest Grid NetWars competition involved 250 security pros from Ukraine | Continue reading


@portswigger.net | 2 years ago

Expired web domains help criminal hackers unlock enterprise defenses

Allow domains to ‘drop’ and you’re increasing the effectiveness of a variety of attacks | Continue reading


@portswigger.net | 2 years ago

PyPI admins remove three malicious packages after more than 10k

Two packages lay undiscovered for 10 months | Continue reading


@portswigger.net | 2 years ago

Intel adds payout bonuses as it migrates bug bounty program to Intigriti

Payout ceiling lifted from $100,000 to $150,000 for 12-month bonus period | Continue reading


@portswigger.net | 2 years ago

Human error bugs increasingly making a splash in hacker-powered pen tests

HackerOne study charts effects of digital transformation and cloud migration | Continue reading


@portswigger.net | 2 years ago

GOautodial vulnerabilities put call center network security on the line

Now-patched bugs were easy to exploit, but required prior authentication/network access | Continue reading


@portswigger.net | 2 years ago

Flaws in Tonga’s top-level domain left Google, Amazon, Tether web services

Misaligned incentives are undermining efforts to tackle TLD bugs with ‘mass-scale impact’ | Continue reading


@portswigger.net | 2 years ago

uBlock, I exfiltrate: exploiting ad blockers with CSS

Ad blockers like uBlock Origin are extremely popular, and typically have access to every page a user visits. Behind the scenes, they're powered by community-provided filter lists - CSS selectors that | Continue reading


@portswigger.net | 2 years ago

Crypto-exchange BitMart reports $150M theft following hack

Security firm said attackers executed a ‘transfer-out, swap, and wash’ | Continue reading


@portswigger.net | 2 years ago

Sixth member of notorious SIM-swapping cybercrime gang sentenced

US crime syndicate ‘The Community’ stole millions of dollars’ worth of cryptocurrency | Continue reading


@portswigger.net | 2 years ago