Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A directory traversal vulnerability exists within the `adddir_name` POST parameter.

ALL

1
NEW

The goal of HardBreak is to collect knowledge about Hardware Hacking / IoT hacking in one place. HardBreak aims to organize all information in one accessible and easy-to-use platform.

NEW

A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting. Free and paid tiers available.

NEW

Your Anti-Scam Partner, Keeping You Safe! Quick check for scams, and report scams with a single click to help protect others.

NEW

Software and Application Security Blog. Get expert insights from the Black Duck software and application security blog. Explore topics from DevOps security, software news, analysis, intel and more.

NEW

Hacking the cloud is an encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. The goal is to share this knowledge with the security community to better defend cloud native technologies.

NEW

The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.

NEW

Traceable's blog offers the latest news in API security, risk reduction, and attack protection from industry experts.

NEW

Hacking techniques and research. Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.

Leading provider of SSL/TLS certificates, automated certificate management and website security solutions. Trusted by the world’s largest brands for 20+ years.

The Latest on VPNs, Privacy, Censorship. See what's happening now in the world of cybersecurity and online privacy. Get your news from a reliable, trustworthy group of cybersecurity experts.

The SecOps Automation Blog. Practical tips & threat analysis from Intezer's Research Team. Product news. Industry insights on the evolution of security operations, automation, and AI.

Analyze and share malware samples and threat intelligence to join the fight against cyber threats.

Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a file and based on analysis results can warn users against malware undetected by classic Anti-Virus products.

Government Technology has IT articles for state, local and city government. Find government news and events.

Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.

We research and share the latest identity attack techniques to help blue teams understand the threats they face.

CyberScoop delivers up-to-the-minute breaking cybersecurity news and is the leading public sector media company reaching top leaders.

VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.

The Largest Password Recovery Community. Join our (discord) community, fully geared towards recovering the plains of hash algorithms. Fully supports non-binary hashcat algorithms. MD5, SHA1, ZIP, Bitcoin, Ethereum, Dogecoin Wallets - we have it all.

The latest Security breaking news, comment, reviews and features from the experts at TechRadar.

The latest research, reports and releases from the minds at Permiso Security.

SiliconANGLE Media Inc. has dedicated itself to covering the massive, often underreported global impact of enterprise and emerging technologies, from semiconductors to computer and networking systems to the cloud, as well as the applications, cybersecurity, AI and machine learning, blockchain and other technologies built on top of that foundation.

Keep up with the latest attack trends, research, and cybersecurity industry updates on the Perception Point blog!

Perception Point’s learning center is full of useful and informative guides on every topic related to enterprise cybersecurity.

Stay up-to-date on the latest cybersecurity topics and security operations thought leadership from ReliaQuest experts.

HeroCTF is an online cybersecurity competition for beginners and intermediates that takes place once a year.

The ATT&CK Navigator is a web-based tool for annotating and exploring ATT&CK matrices. It can be used to visualize defensive coverage, red/blue team planning, the frequency of detected techniques, and more.

Sonar is the home of Clean Code. Our blog showcases our products. SonarLint, SonarQube & SonarCloud - trusted by 400k+ organizations globally.

Get the latest information, insights, and news from Microsoft.

IT Security expertise - Penetration tests, Security audits, Code review, Training, Consulting, Vulnerability research

CryptoBook is a community project, developed by members of CryptoHack to create a resource for people to learn cryptography. The focus of this project is to create a friendly resource for the mathematical fundamentals of cryptography, along with corresponding SageMath implementation.

Menlo Labs provides insights, expertise, context and tools to aid customers on their journey to connect, communicate and collaborate securely without compromise. The collective is made up of elite security researchers that put a spotlight on the threats you know and don’t know about.

Read more about how Netskope is enabling security and networking transformation through secure access service edge (SASE).

Tackle tech challenges together. Join our IT community to connect, share your expertise, get answers, stay up with trends, advance your career, and keep IT fun!

Sinkholing is a technique whereby a resource used by malicious actors to control malware is taken over and redirected to a benign listener that can (to a varying degree) understand network connections coming from infected devices. This provides visibility of the distribution of infected devices worldwide, as well as protecting victims by preventing botnet command and control (C2) from cybercriminals.

1