Discover the details of 8 critical Bluetooth protocol security flaws that could impact billions of smart devices including smartphones and IoT gadgets. Learn ab
Discover how SAML service vulnerabilities can be exploited to bypass Uber’s internal chat system authentication mechanism. Learn the steps and techniques used i
Discover the details of a critical arbitrary file deletion vulnerability in Discuz! X3.3, X3.2, X3.1 and X2.5 versions, and learn about mitigation measures to p
This article analyzes the Windows DNS API RCE vulnerability discovered in Microsoft's 2017 security bulletin, focusing on the Nsec3_RecordRead function within d
Google has launched a new project to clear vulnerabilities from the Google Play store by rewarding security experts who discover flaws in Android apps with at l