Monday, September 9, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Undocumented Telnetd... + continue reading
Monday, September 2, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
GPSRP pays researchers for reporting abusiv google playstore apps Adam Bacchus, Sebastian Porst, and Patrick Mutchler  of the  Android Security... + continue reading
Friday, August 9, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Apple Updates Bug Bounty Program Q4 In recent years, Apple and the company around cupertino have received massive criticism about the current Bug Bounty program. Among other things, well-known security researchers from the scene have criticized Apple for a faulty program, which attracts others but... + continue reading
Thursday, March 7, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Telekom Magenta Musik 360 - CERT Coordinates The videos shows the reproduce for the german telekom in a new service they did publish in 2019 Q1. The vulnerabilities are persistent and non-persistent cross site scripting issues within the front / backend of the online service. Remote attackers... + continue reading
Friday, February 15, 2019
Posted by Editorial_Staff_Team
Reader's rate:
5
Internation Bug Bounty Program to PenTest E-Voting System The federal government of switzerland offers hackers who can uncover vulnerabilities, privacy issues or simple bugs in its e-voting system up to 44,000 euros. International White Hat or ethics hackers are given the opportunity to... + continue reading
Monday, December 24, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Yes, we did it again! Due to the last few years we have discovered several problems that bypass the password protection mechanism of ios. In recent weeks we have discovered a new problem affecting the latest ios versions 12.1 and 12.1.1.1. The vulnerability allows password protection to be... + continue reading
Friday, November 16, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Open Redirect in Microsoft BingPlaces Business uncovered Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces business web-application. The issue allows to redirect users by client-side get method request to... + continue reading
Monday, August 20, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security... + continue reading
Tuesday, July 24, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating systems such as OpenWrt, Android and Bananian. The R1 has a slim router form factor with a bay for 2.5... + continue reading

Featured Cooperative Security Articles

Monday, 02/09/19 - 1 comment(s)
GPSRP pays researchers for reporting abusiv google playstore apps Adam Bacchus, Sebastian Porst, and Patrick Mutchler  of the  Android Security... + continue reading

TOP SECURITY STORIES

Friday, 09/08/19 - 2 comment(s)
Apple Updates Bug Bounty Program Q4 In recent years, Apple and the company around cupertino have received massive criticism about the current Bug Bounty program. Among other things, well-known... + continue reading

BEST SECURITY VIDEOS

Thursday, 07/03/19 - 1 comment(s)
Telekom Magenta Musik 360 - CERT Coordinates The videos shows the reproduce for the german telekom in a new service they did publish in 2019 Q1. The vulnerabilities are persistent and non-... + continue reading

LAB MAGAZINE ISSUES

Wednesday, 12/03/14 - 1 comment(s)
Vulnerability Magazine Welcome to the Vulnerability Magazine! The the vulnerability magazine, publishes the latest vulnerabilities and security informations from our laboratory infrastructure.... + continue reading

IT-SECURITY EVENTS

Friday, 24/11/17 - 2 comment(s)
Legendary free speech - You are the Key! In the last weeks we got invited to the very famous JBFone Conference organized by the Fiducia & GAD IT AG. The Fiducia & GAD IT AG is a public... + continue reading
Wed
11
Jul
Editorial_Staff_Team's picture

New HackRF Case for Devs & Pentesters Released (ABS & PLA)

New HackRF Case Available (ABS & PLA)

HackRF One first version is part of great scott gadgets which is a software defined radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz. The HackRF One can send and receive almost any radio signal. This allows pentesters to disable smarthome alarm systems, open cars and intercept SMS messages. Even telephone calls can be tapped or simply listed by the frequence. The hackrf device is well known in the it-security business by researchers and developers.

Normally the hackrf is delivered with a hard metal case, metal plates and some screws like you can see in the following picture.

Thu
05
Jul
Editorial_Staff_Team's picture

AT&T Corporation - Lab uncovers new details about BizCircle Vulnerabilities

AT&T BizCircle - Frontend & Backend Vulnerabilities

Last month, researchers in our laboratory conducted in-depth safety tests on the AT&T BizCircle Platform. This has identified a number of security holes that AT&T has now eliminated. The core researchers in the laboratory go into more detail in the article.

This time the reported security vulnerabilities of the core team were limited to the frontend and backend management of the BizCircle application. Validation weaknesses and output errors in the user profile of the application were exploited. These allowed an attacker to inject malicious script code with persistent attack vectors. The affected entries were e.g. display name, first name & load name.

Pages

Subscribe to Vulnerability Magazine - Bug Bounties, Acknoweldgements & Security Research RSS