Why Was Facebook Vulnerable to an Authentication Exploit?

Spread the love

What Happened: As part of a bug bounty program, the AppSecure cybersecurity research team found a vulnerability on the authentication mechanism of Facebook. It gave them the ability to potentially gain full control of the social media giant’s more than 1 billion users. The team won a $15,000 bounty for its discovery. This vulnerability was […]
The post Why Was Facebook Vulnerable to an Authentication Exploit? appeared first on DevOps.com.

Next Post

Cycloid Tool Can Reverse Engineer Provisioned IaC

Fri Jul 30 , 2021
Spread the loveCycloid this week unveiled a tool that makes it possible to reverse engineer code used to manually provision cloud infrastructure. The Infra Import tool is part of an effort to create a more consistent and reliable version of that code using open source Terraform software. Benjamin Brial, Cycloid […]