#vulnerability-disclosure

[ follow ]
fromThe Hacker News
1 week ago

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform's network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and commercial spyware vendors.
Information security
Information security
fromIT Pro
2 weeks ago

GitHub is awash with leaked AI company secrets - API keys, tokens, and credentials were all found out in the open

65% of 50 examined AI companies leaked verified secrets on GitHub, often buried in deleted forks, gists, and developer repositories.
fromTechzine Global
1 month ago

Axis Communications builds cyber wall around popular IoT devices

Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be seen mainly as an add-on, it is now a fundamental part of product development and partner policy. According to Fabian de Clippelaar, Engineer at Axis Communications, this shift did not come out of the blue. "The growing computing power of devices offers opportunities for innovation. But if that power is not applied or secured in the right way, it can also cause serious problems."
Information security
fromSecurityWeek
2 months ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
Information security
fromTheregister
3 months ago

Bug bounties: The good, the bad, and the frankly ridiculous

Bug bounty programs evolved from Netscape's initial effort into diverse commercial and government models with varied effectiveness, platforms, and researcher risks.
[ Load more ]