#vulnerability-disclosure

[ follow ]
fromTechCrunch
1 day ago

Exclusive: Home Depot exposed access to internal systems for a year, says researcher

When he tested the token, Zimmermann said that it granted access to hundreds of private Home Depot source code repositories hosted on GitHub and allowed the ability to modify their contents. The researcher said the keys allowed access to Home Depot's cloud infrastructure, including its order fulfillment and inventory management systems, and code development pipelines, among other systems. Home Depot has hosted much of its developer and engineering infrastructure on GitHub since 2015, according to a customer profile on GitHub's website.
Information security
#bug-bounty
Information security
fromTechCrunch
2 days ago

Security flaws in Freedom Chat app exposed users' phone numbers and PINs | TechCrunch

Freedom Chat had vulnerabilities that allowed mass-guessing of users' phone numbers and exposure of user PINs; the company reset PINs and added protections.
Information security
fromTheregister
4 days ago

UK finally vows to look at 35-year-old Computer Misuse Act

Portugal enacted legal protections for security researchers, increasing pressure on the UK to amend its 1990 Computer Misuse Act to safeguard vulnerability research.
Information security
fromTheregister
1 week ago

Cloudflare blames Friday outage on borked React2shell fix

Cloudflare intentionally took down its network to patch the critical React2Shell vulnerability, causing a major outage while denying any cyber attack caused it.
fromComputerWeekly.com
1 week ago

UK government pledges to rewrite Computer Misuse Act | Computer Weekly

Speaking on 3 December at the Financial Times Cyber Resilience Summit 2025, security minister Dan Jarvis said: "We've heard the criticisms about the Computer Misuse Act, and how it can leave many cyber security experts feeling constrained in the activity that they can undertake. These researchers play an important role in increasing the resilience of UK systems, and securing them from unknown vulnerabilities."
Law
fromThe Hacker News
3 weeks ago

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform's network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and commercial spyware vendors.
Information security
Information security
fromIT Pro
1 month ago

GitHub is awash with leaked AI company secrets - API keys, tokens, and credentials were all found out in the open

65% of 50 examined AI companies leaked verified secrets on GitHub, often buried in deleted forks, gists, and developer repositories.
fromTechzine Global
1 month ago

Axis Communications builds cyber wall around popular IoT devices

Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be seen mainly as an add-on, it is now a fundamental part of product development and partner policy. According to Fabian de Clippelaar, Engineer at Axis Communications, this shift did not come out of the blue. "The growing computing power of devices offers opportunities for innovation. But if that power is not applied or secured in the right way, it can also cause serious problems."
Information security
fromSecurityWeek
3 months ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
[ Load more ]