Skip to content

news.buyenne.com

Extended Android security check: SnoopSnitch tests for Java vulnerabilities

SnoopSnitch now detects missing Android Java patches. SRLabs explains how bytecode signatures double patch coverage and help close the Android patch gap.

SnoopSnitch now detects missing Android Java patches. SRLabs explains how bytecode signatures double patch coverage and help close the Android patch gap.
Author Security Research Labs BlogPosted on 12 May 2022Categories Uncategorised

Your Blockchain is only as secure as the application on top of it

SRLabs found a flaw in SocialKYC that allowed fake Twitter verifications. A three-line fix shows why blockchain apps must be reviewed as thoroughly as chains.

SRLabs found a flaw in SocialKYC that allowed fake Twitter verifications. A three-line fix shows why blockchain apps must be reviewed as thoroughly as chains.
Author Security Research Labs BlogPosted on 22 March 2022Categories Uncategorised

FlightGear 2020.3.12 released

The latest bug-fix release in our stable 2020.3 series was released today: we are up to version 2020.3.12 now.

The latest bug-fix release in our stable 2020.3 series was released today: we are up to version 2020.3.12 now.
Author FlightGear Flight SimulatorPosted on 3 February 2022Categories Uncategorised

When your phone gets sick: FluBot abuses Accessibility features to steal data

FluBot malware exploits Android Accessibility to steal banking credentials, spread via SMS, and block removal—making it today’s top mobile threat.

FluBot malware exploits Android Accessibility to steal banking credentials, spread via SMS, and block removal—making it today’s top mobile threat.
Author Security Research Labs BlogPosted on 21 December 2021Categories Uncategorised

Chaining Three Zero-Day Exploits in ITSM Software ServiceTonic for Remote Code Execution

SRLabs chained three zero-days in ServiceTonic ITSM—HQL injection, SSO flaw, and path traversal—to gain full remote code execution.

SRLabs chained three zero-days in ServiceTonic ITSM—HQL injection, SSO flaw, and path traversal—to gain full remote code execution.
Author Security Research Labs BlogPosted on 2 November 2021Categories Uncategorised

Blockchain security – Six common mistakes found in Substrate chains

SRLabs outlines six common bug classes in Substrate-based blockchains, from logic flaws to unsafe arithmetic, and how to mitigate them.

SRLabs outlines six common bug classes in Substrate-based blockchains, from logic flaws to unsafe arithmetic, and how to mitigate them.
Author Security Research Labs BlogPosted on 12 October 2021Categories Uncategorised

Blockchain security – Best practices for your next review

SRLabs shares a four-step methodology for auditing Substrate-based blockchains, combining threat modeling, design review, fuzzing, and code audits.

SRLabs shares a four-step methodology for auditing Substrate-based blockchains, combining threat modeling, design review, fuzzing, and code audits.
Author Security Research Labs BlogPosted on 27 September 2021Categories Uncategorised

Balancing long-term technology evolution with short-term side-effects – Vulnerability disclosure best practices

SRLabs shares best practices for responsible vulnerability disclosure (CVD), guiding researchers and vendors toward secure, collaborative outcomes.

SRLabs shares best practices for responsible vulnerability disclosure (CVD), guiding researchers and vendors toward secure, collaborative outcomes.
Author Security Research Labs BlogPosted on 13 September 2021Categories Uncategorised

Honeypot research shows variety of DDoS amplification methods

Hackers exploit UDP services like Chargen, SSDP, and STUN for DDoS amplification. Misconfigured devices fuel massive attacks—better defenses are vital.

Hackers exploit UDP services like Chargen, SSDP, and STUN for DDoS amplification. Misconfigured devices fuel massive attacks—better defenses are vital.
Author Security Research Labs BlogPosted on 30 July 2021Categories Uncategorised

Achieving Telerik Remote Code Execution 100 Times Faster

Optimized exploitation of Telerik UI CVE-2017-9248 turns an “impractical” flaw into remote code execution risk for enterprises.

Optimized exploitation of Telerik UI CVE-2017-9248 turns an “impractical” flaw into remote code execution risk for enterprises.
Author Security Research Labs BlogPosted on 22 June 2021Categories Uncategorised

Posts pagination

Previous page Page 1 … Page 122 Page 123 Page 124 … Page 1,763 Next page

Recent Posts

  • Neutron rocket’s debut slips into mid-2026 as company seeks success from the start
  • Intuitive Machines—known for its Moon landers—will become a military contractor
  • Researchers isolate memorization from reasoning in AI neural networks
  • Canada fought measles and measles won; virus now endemic after 1998 elimination
  • Cox Accuses Labels of ‘Distancing’ Themselves From “Two-Strike” Piracy Theory

Recent Comments

  1. A WordPress Commenter on Hello world!
news.buyenne.com Proudly powered by WordPress