GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.

ALL

16

Check point Cyber-hub, Explore all the cyber security topics in one place and learn how to secure your business from cyber threats.

Videos all about computers and computer stuff. Sister channel of Numberphile.

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Linux, Python, Ethical Hacking, Networking, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos uploaded every week! Subscribe for technical, detailed, no fluff content

Trick Gandalf into revealing information and experience the limitations of large language models firsthand. Your goal is to make Gandalf reveal the secret password for each level. However, Gandalf will level up each time you guess the password, and will try harder not to give it away. Can you beat level 7? (There is a bonus level 8)

Cyber Security Blogs, News and Articles. Keep up-to-date with the latest news, articles, surveys, research on cyber security. Visit our cyber security blogs and find the latest cyber security trends.

The Legit Security Blog. Our mission is to secure every organization's software factory (code, pipelines, infrastructure and people) for faster and more secure software releases.

The OWASP Mobile Application Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS) and a comprehensive testing guide (OWASP MASTG) that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.

Website with the collection of all the cheat sheets of the project.

I'm snovvcrash and I do ethical penetration testing, red teaming, offensive tooling developement and cybersecurity researching. This is a GitBook of mine whose purpose is keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... responsibly, of course!

Stay Ahead in Data Security, Gavernance, Privacy and Compliance. Explore expert insights on governance and data privacy at our blog. Stay informed with our thought-provoking articles, news, and industry updates.

Explore our Knowledge Center for comprehensive data and governance resources. Access articles, guides, and insights to enhance your security practices.

I break down and dissect cyber security related tech news.

zSecurity is a leading provider of ethical hacking and cyber security training, we teach hacking and security to help people become ethical hackers so they can test and secure systems from black-hat hackers.

The Ethernaut is a Web3/Solidity based wargame played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players.

A portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It's fully open-source and customizable, so you can extend it in whatever way you like.

Welcome to Google's Bug Hunting community, learn more about hunting & reporting bugs you’ve found in Google products.

Whether you've just started your hacker journey or you're just looking for some new challenges, the Hacker101 CTF has something for you.

All in One Hacking tool For Hackers

The cybersecurity upskilling platform. Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place.

The world’s first bug bounty platform for AI/ML. huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications, including those powered by Open Source Software (OSS).

Free Cybersecurity Education and Ethical Hacking.

Learn to harness next-gen technologies to build the bridges that will lead us to a better tomorrow.

just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions.

Mr Loi Liang Yang is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker and CompTIA Security+ cybersecurity consultant. Loi advises large enterprises including multiple fortune 500 companies on security strategy to protect against advanced threats.

My name is Brandon Marshall (aka Marsh) I am currently working as an Offensive Security Researcher. A majority of my time is spent developing internal Red Team tooling, reverse engineering, and exploit creation.

Microsoft offers cash awards for finding and reporting certain types of vulnerabilities and exploitation techniques.

Build skills that open doors. See all you can do with documentation, hands-on training, and certifications to help you get the most from Microsoft products.

Welcome to the official MR. ROBOT [mr.rob0t] channel where you can catch all the best moments from the series and join Elliot (Rami Malek) on his mission to bring down the big corporations he's paid to protect.

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.

Web Application Security Researcher

The PC Security Channel is your go to place for cybersecurity. We test security products and create some of the best educational content about malware and threat analysis and other infosec topics.

Atomic Red Team™ is library of tests mapped to the MITRE ATT&CK framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

16