In store_upgrade and store_cmd of drivers/input/touchscreen/stm/ftm4_pdc.c, there are out of bound writes due to missing bounds checks or integer underflows. These could lead to escalation of privilege.

ALL

19

Malware Analysis, News and Indicators.

Cyber security insights and guidance from the frontlines. Read expert perspectives and get all the latest cyber security industry news at the Mandiant blog.

a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

What’s the deal with Virtual Private Networks? Discover how they work, why they’re important and what using a VPN can do for you.

Generating foreign intelligence insights. Applying cybersecurity expertise. Securing the future.

This repository is for the Offensive Security and Reverse Engineering Course. I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings).

Global Security Resource. In these times where a new major data breach occurs on a daily basis, it is important for the personal Internet user, corporations, and governments to stay aware of vulnerabilities that may affect their systems. Packet Storm provides around-the-clock information and tools in order to help mitigate both personal data and fiscal loss on a global scale. As new information surfaces, Packet Storm releases everything immediately through it's RSS feeds, Twitter, and Facebook. The site is referenced in over a hundred books and has a history of being spotlighted in the news.

A list of useful payloads and bypass for Web Application Security and Pentest/CTF.

The Proofpoint cybersecurity blog provides you with advanced cybersecurity intelligence and insights, threat research, and breaking cyber attack news. Get the latest news about advanced threats.

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

Cybersecurity News, Awards, eSummits, Research.

Compete against the world's top crypto security experts and make a name for yourself.

Search Engine for the Internet of Everything. Shodan is the world's first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.

A project that aims simplify the task of tracking down audiobooks for anarchist content by creating a single searchable repository of links to audiobooks, as well as expand the number of available audiobooks through the use of machine learning based text-to-speech software.

Magazine, Website, Newsletter & Webinar service covering Cybersecurity, Network Security, Application Security, Operational security, and Technology & AI.

Participate in online virtual and in-person hackathons to build products, practice skills, learn technologies, win prizes, and grow your network.

The latest news and insights from Google on security and safety on the Internet

Expert Bug Bounty Platform for Crypto Projects.

Reduce the risk of a security incident by working with the world’s largest community of trusted ethical hackers. HackerOne offers bug bounty, VDP, security assessments, attack surface management, and pentest solutions.

Bug bounty and agile penetration testing solutions powered by Europe's leading network of ethical hackers.

Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.

Educating people on the use and abuse of AI.

Industry news, insights from cybersecurity experts, and new product, feature, and company announcements.

Your one-stop-shop to learn all about Blockchain development and Crypto Technologies.

Sticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTFs.

These are notes about all things focusing on, but not limited to, red teaming and offensive security.

An archive focusing on anarchism and anarchist texts.

Explore YesWeHack, leading global Bug Bounty & Vulnerability Management Platform. Connect with tens of thousands of ethical hackers worldwide to uncover vulnerabilities in your websites, mobile apps, and digital infrastructure, bolstering your cyber defense strategy.

Stay up-to-date on the latest in top security news and industry perspectives from the Flare team.

19