Skip to content

news.buyenne.com

Hacking mobile networks has gotten a lot more interesting with 5G and Open RAN

5G shifts security risks to the cloud. Learn how Docker misconfigurations expose telco networks and how red teaming helps keep 5G hacking resilient.

5G shifts security risks to the cloud. Learn how Docker misconfigurations expose telco networks and how red teaming helps keep 5G hacking resilient.
Author Security Research Labs BlogPosted on 8 August 2022Categories Uncategorised

Extended Android security check: SnoopSnitch tests for Java vulnerabilities

SnoopSnitch now detects missing Android Java patches. SRLabs explains how bytecode signatures double patch coverage and help close the Android patch gap.

SnoopSnitch now detects missing Android Java patches. SRLabs explains how bytecode signatures double patch coverage and help close the Android patch gap.
Author Security Research Labs BlogPosted on 12 May 2022Categories Uncategorised

Your Blockchain is only as secure as the application on top of it

SRLabs found a flaw in SocialKYC that allowed fake Twitter verifications. A three-line fix shows why blockchain apps must be reviewed as thoroughly as chains.

SRLabs found a flaw in SocialKYC that allowed fake Twitter verifications. A three-line fix shows why blockchain apps must be reviewed as thoroughly as chains.
Author Security Research Labs BlogPosted on 22 March 2022Categories Uncategorised

FlightGear 2020.3.12 released

The latest bug-fix release in our stable 2020.3 series was released today: we are up to version 2020.3.12 now.

The latest bug-fix release in our stable 2020.3 series was released today: we are up to version 2020.3.12 now.
Author FlightGear Flight SimulatorPosted on 3 February 2022Categories Uncategorised

When your phone gets sick: FluBot abuses Accessibility features to steal data

FluBot malware exploits Android Accessibility to steal banking credentials, spread via SMS, and block removal—making it today’s top mobile threat.

FluBot malware exploits Android Accessibility to steal banking credentials, spread via SMS, and block removal—making it today’s top mobile threat.
Author Security Research Labs BlogPosted on 21 December 2021Categories Uncategorised

Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution

SRLabs chained three zero-days in ServiceTonic ITSM—HQL injection, SSO flaw, and path traversal—to gain full remote code execution.

SRLabs chained three zero-days in ServiceTonic ITSM—HQL injection, SSO flaw, and path traversal—to gain full remote code execution.
Author Security Research Labs BlogPosted on 2 November 2021Categories Uncategorised

Blockchain security – Six common mistakes found in Substrate chains

SRLabs outlines six common bug classes in Substrate-based blockchains, from logic flaws to unsafe arithmetic, and how to mitigate them.

SRLabs outlines six common bug classes in Substrate-based blockchains, from logic flaws to unsafe arithmetic, and how to mitigate them.
Author Security Research Labs BlogPosted on 12 October 2021Categories Uncategorised

Blockchain security – Best practices for your next review

SRLabs shares a four-step methodology for auditing Substrate-based blockchains, combining threat modeling, design review, fuzzing, and code audits.

SRLabs shares a four-step methodology for auditing Substrate-based blockchains, combining threat modeling, design review, fuzzing, and code audits.
Author Security Research Labs BlogPosted on 27 September 2021Categories Uncategorised

Balancing long-term technology evolution with short-term side-effects – Vulnerability disclosure best practices

SRLabs shares best practices for responsible vulnerability disclosure (CVD), guiding researchers and vendors toward secure, collaborative outcomes.

SRLabs shares best practices for responsible vulnerability disclosure (CVD), guiding researchers and vendors toward secure, collaborative outcomes.
Author Security Research Labs BlogPosted on 13 September 2021Categories Uncategorised

Honeypot research shows variety of DDoS amplification methods

Hackers exploit UDP services like Chargen, SSDP, and STUN for DDoS amplification. Misconfigured devices fuel massive attacks—better defenses are vital.

Hackers exploit UDP services like Chargen, SSDP, and STUN for DDoS amplification. Misconfigured devices fuel massive attacks—better defenses are vital.
Author Security Research Labs BlogPosted on 30 July 2021Categories Uncategorised

Posts pagination

Previous page Page 1 … Page 71 Page 72 Page 73 … Page 1,712 Next page

Recent Posts

  • Lilbits: A new handheld Linux PC, Google opens up the Play Store (a little), Samsung’s web browser comes to PCs
  • Calley Means is out of the White House; Casey Means misses Senate hearing
  • Man finally released a month after absurd arrest for reposting Trump meme
  • Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
  • Caught cheating in class, college students “apologized” using AI—and profs called them out

Recent Comments

  1. A WordPress Commenter on Hello world!
news.buyenne.com Proudly powered by WordPress