Using XSS without user interaction?

The most common use cases for XSS seem to be related to hijacking a users session, but are there any ways an XSS vulnerability can be used without relying on user interaction? I get that the main point of XSS is to run JS in someone else’s browser sess…

January 6, 2023
Read More >>

Recent 2022 cyberattacks presage a rocky 2023

A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats.
The post Recent 2022 cyberattacks presage…

January 6, 2023
Read More >>