Category: Vulnerabilities

bug bounties, chrome

Google Triples Some Bug Bounty Payouts

Google is announcing much higher bug bounty payouts for Chrome, Chrome OS and Google Play. . Google Triples Some Bug Bounty Payouts ThreatpostSource link Read More

Black Hat USA 2019: Top Mobile AppSec Talks
Android, Black Hat USA 2019

Black Hat USA 2019: Top Mobile AppSec Talks

Black Hat USA 2019: Top Mobile AppSec Talks The NowSecure team is gearing up for an incredible week at Black Hat USA 2019 in Las ... Read More

BlueKeep, critical vulnerability

Wormable BlueKeep Bug Still Threatens Legions of Windows Systems

Two months after the alarm sounded warning of a WannaCry-level event, progress in patching exposed Windows systems varies by country and industry. . Wormable BlueKeep ... Read More

Acer, AMAX

Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted

Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware. . Firmware Bugs Plague Server Supply Chain, 7 Vendors ... Read More

Apple, BLE

Bluetooth Flaws Could Allow Global Tracking of Apple, Windows 10 Devices

Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector. . Bluetooth Flaws ... Read More

API, application programming interface

LenovoEMC Storage Gear Leaks Sensitive Financial Data

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can ... Read More

attack vector, developer practices

WhatsApp, Telegram Coding Blunders Can Expose Personal Media Files

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can ... Read More

Researcher Bypasses Instagram 2FA to Hack Any Account
account takeover, Brute Force

Researcher Bypasses Instagram 2FA to Hack Any Account

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process. . Researcher Bypasses Instagram 2FA to Hack Any ... Read More

Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks
breach, cyberattacks

Threatlist: 68% of Overwhelmed IT Managers Can’t Keep Up with Cyberattacks

Most respondents in a recent survey say they're losing the battle despite having up-to-date protections in place. . Threatlist: 68% of Overwhelmed IT Managers Can’t ... Read More