Last month’s Hacker Summer Camp brought together hackers, researchers, practitioners and leaders in cybersecurity to review the cutting edge of security research, share tools and techniques, and find out what’s at the front of everyone’s mind in the security space. So, what was at the forefront of the conversation this year in Las Vegas, and […]| CableLabs
SQL injections seem to be a solved problem; databases have built-in support for prepared statements, leaving no room for injections. In this session, we will go a level deeper: instead of attacking the query syntax, we will explore smuggling attacks against database wire protocols, through which remote, unauthenticated attackers can inject entire (No)SQL statements into an application's database connection.| pspaul's blog
ProxyShell vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world.| Help Net Security
The Biden administration is looking to understand just how widespread open-source software is in critical infrastructure.| CyberScoop