Covid-19, breath alcohol test results of 164,000 Wyoming residents exposed

Wyoming health department employee uploaded sensitive data to software code repositories | Continue reading


@portswigger.net | 3 years ago

Open Bug Bounty maintainers on finding a niche in the crowdsourced AppSec market

Vulnerability disclosure platform driven by ‘transparency and fairness’, with over 500,000 bugs fixed since 2014 | Continue reading


@portswigger.net | 3 years ago

Prototype Pollution

A new class of security flaw is emerging from obscurity | Continue reading


@portswigger.net | 3 years ago

SSRF vulnerability in NPM package Netmask impacts up to 279k projects

nodejs developers urged to check their projects for vulnerable package | Continue reading


@portswigger.net | 3 years ago

OAuth Attack Vectors

Intro The OAuth2 authorization protocol has been under fire for the past ten years. You've probably already heard about plenty of "return_uri" tricks, token leakages, CSRF-style attacks on clients, an | Continue reading


@portswigger.net | 3 years ago

Xerox legal threat silences researcher at Infiltrate security conference

An infosec conference talk was allegedly canceled due to a ‘cease and desist’ demand | Continue reading


@portswigger.net | 3 years ago

Go typosquatting package relays info to tech firm

One of several dubious repositories flagged by custom-built tool | Continue reading


@portswigger.net | 3 years ago

Top (novel) Web Hacking Techniques of 2020

Welcome to the Top 10 (novel) Web Hacking Techniques of 2020, our annual community-powered effort to identify the must-read web security research released in the previous year. Over the past few weeks | Continue reading


@portswigger.net | 3 years ago

Centris helps prevent supply chain attacks by flagging modified open source s/w

Tackling vulnerability propagation and license violation, one scan at a time | Continue reading


@portswigger.net | 3 years ago

Potential remote code execution vulnerability uncovered in Node.js apps

Local file read and RCE errors have been linked to Express.js and Handlebars usage | Continue reading


@portswigger.net | 3 years ago

NMAP project latest victim of Google’s ‘wrongful blocking’ of cybersec resources

Open source tool was incorrectly labeled as a threat by Chrome’s Safe Browsing program last week | Continue reading


@portswigger.net | 3 years ago

Open source TinyCheck turns your Raspberry Pi into a stalkerware detection unit

Tool captures potentially malicious communications being sent from smartphone to WiFi points | Continue reading


@portswigger.net | 3 years ago

OAuth 2.0 Authentication Vulnerabilities

While browsing the web, you've almost certainly come across sites that let you log in using your social media account. The chances are that this feature is ... | Continue reading


@portswigger.net | 3 years ago

Portable Data ExFiltration: XSS for PDFs

Abstract PDF documents and PDF generators are ubiquitous on the web, and so are injection vulnerabilities. Did you know that controlling a measly HTTP hyperlink can provide a foothold into the inner w | Continue reading


@portswigger.net | 3 years ago

Van Buren appeal arguments in light of Computer Fraud and Abuse Act ambiguity

Ruling over interpretation of aging law could have a chilling or liberating effect on security research | Continue reading


@portswigger.net | 3 years ago

SD-PWN – “attack could shut down a company’s entire international network”

Chained attack could ‘shut down a company’s entire international network’ | Continue reading


@portswigger.net | 3 years ago

Mashable data breach leaks emails, gender, and social profiles

US news site confirms database leak | Continue reading


@portswigger.net | 3 years ago

Google Cloud API bug leaks private project information

The now-patched privacy flaw puts unsecured resources in jeopardy | Continue reading


@portswigger.net | 3 years ago

Jitsi’s Emil Ivov on scaling up the video conferencing platform during pandemic

Open source program has seen 100-fold increase since the coronavirus outbreak | Continue reading


@portswigger.net | 3 years ago

Researchers exploit HTTP/2, WPA3 protocols to stage ‘timeless timing’ attacks

New hacking technique overcomes ‘network jitter’ issue that can impact the success of side-channel attacks | Continue reading


@portswigger.net | 3 years ago

Browser fingerprinting more prevalent on the web now than ever before – research

New tool allows users to prevent themselves from being tracked online | Continue reading


@portswigger.net | 3 years ago

GitHub security team finds remote code exec bug in Node.js standard-version lib

Vulnerability impacts standard-version utility, which is used by more than 20,000 projects | Continue reading


@portswigger.net | 3 years ago

Behave browser extension alerts users to website port scanning, DNS rebinding

Open source privacy tool now available for Chrome and Firefox | Continue reading


@portswigger.net | 3 years ago

Signal patches (minor) approximate location disclosure flaw

WebRTC DNS lookups exploited in clever hack | Continue reading


@portswigger.net | 3 years ago

Web Cache Deception Named Top Web Hacking Technique of 2019

This is no basic listicle | Continue reading


@portswigger.net | 4 years ago

Browser slurping takes backseat with Chrome removal of malicious extensions

Foul play, potentially | Continue reading


@portswigger.net | 4 years ago

Top web hacking techniques of 2019

The results are in! After 51 nominations whittled down to 15 finalists by a community vote, an expert panel consisting of Nicolas Grégoire, Soroush Dalili, Filedescriptor, and myself have conferred, v | Continue reading


@portswigger.net | 4 years ago

Travelex pulls systems offline after NYE malware attack

Web and mobile impacted | Continue reading


@portswigger.net | 4 years ago

Cracking ReCAPTCHA, Turbo Intruder Style

Tired of proving you're not a robot? In this post, I'll show how you can partially bypass Google reCAPTCHA by using a new Turbo Intruder feature to trigger a race condition. This vulnerability was rep | Continue reading


@portswigger.net | 4 years ago

Practical Web Cache Poisoning

In this paper I'll show you how to compromise websites by using esoteric web features to turn their caches into exploit delivery systems | Continue reading


@portswigger.net | 4 years ago

HTTP Desync Attacks: what happened next

Last month I published HTTP Desync Attacks: Request Smuggling Reborn. Since then, there's been a range of new developments. While vendors have been deploying fixes and publishing advisories, I've devi | Continue reading


@portswigger.net | 4 years ago

What Is Clickjacking

In this section we will explain what clickjacking is, describe common examples of clickjacking attacks and discuss how to protect against these attacks. ... | Continue reading


@portswigger.net | 4 years ago

Comodo stung by vBulletin forum exploit

Security firm scrambles to respond to breach | Continue reading


@portswigger.net | 4 years ago

HTTP Desync Attacks: Request Smuggling Reborn

HTTP Desync Attacks: Request Smuggling Reborn | Continue reading


@portswigger.net | 4 years ago

VBulletin zero-day: Critical exploit leaves forum sites open to attack

Incoming! | Continue reading


@portswigger.net | 4 years ago

HTTP Desync Attacks: Request Smuggling Reborn

HTTP Desync Attacks: Request Smuggling Reborn | Continue reading


@portswigger.net | 4 years ago

The age of browser XSS filters is over

Continue reading


@portswigger.net | 4 years ago

Learning XML External Entity (XXE) Injection (Tutorial)

Continue reading


@portswigger.net | 4 years ago

Abusing jQuery for CSS powered timing attacks

Continue reading


@portswigger.net | 4 years ago

Edge Side Includes Abused to Enable RCE

Continue reading


@portswigger.net | 5 years ago

XSS vulnerability in unmaintained JavaScript library poses severe risk

Continue reading


@portswigger.net | 5 years ago

When Security Features Collide

Continue reading


@portswigger.net | 5 years ago

Turbo Intruder: Embracing the Billion-Request Attack

Continue reading


@portswigger.net | 5 years ago

US.gov techies given 10 days to lock down DNS servers

Continue reading


@portswigger.net | 5 years ago

Ruby taken off the rails by deserialization exploit

Continue reading


@portswigger.net | 5 years ago

An overview of the top web hacking techniques of 2017

Continue reading


@portswigger.net | 5 years ago

Bypassing CSP using polyglot JPEGs

Continue reading


@portswigger.net | 5 years ago

Burp Suite 2.0 beta now available

Continue reading


@portswigger.net | 5 years ago