Aggregator
Brief Overview of the DeerStealer Distribution Campaign
Our team recently uncovered a malware distribution campaign for a threat we’ve named DeerStealer. The malware was spread through fake Google Authenticator websites, captured in this analysis session. The site appears to be a Google page offering the application for download. The first site we discovered, authentificcatorgoolglte[.]com, mimics safety.google/intl/en_my/cybersecurity-advancements: Clicking the Download button sends visitor […]
The post Brief Overview of the DeerStealer Distribution Campaign appeared first on ANY.RUN's Cybersecurity Blog.
Cost of a Data Breach Surges 10% on Shadow Data Challenge
2024年8月网络安全行业活动、赛事一览
ISC.AI2024开幕 周鸿祎发布国内首个免费安全大模型
网宿安全发布《2023年互联网安全报告》 主张建设体系化主动安全
史上最难攻防季 值得关注的攻击趋势及应对姿势
【六周年庆】联合礼包!翻倍奖励!OSRC携手5家SRC欢庆生日!
From Geopolitics to Boardrooms: The Impact of the Kaspersky Ban
On the heels of the recent U.S. ban on Kaspersky antivirus software, it was expected that Kaspersky would begin to remove resources in the U.S. However, few expected them to lay off all the U.S.-employee base with such efficiency.
The post From Geopolitics to Boardrooms: The Impact of the Kaspersky Ban appeared first on Security Boulevard.
CSE 2024 CFP
办公电脑遭病毒远程控制!公安部发布多起财会人员被黑典型案例
史上最高!这家企业向勒索软件支付了超5.4亿元赎金
Gray Box Testing in Cybersecurity: Finding the Right Balance for Security
One critical method employed by security professionals to test systems’ strength and resilience is penetration testing. Gray-box testing is a balanced and practical approach that combines black-box and white-box testing elements. This blog explains the nuances of gray-box testing in cybersecurity and explores its characteristics, advantages, and techniques. What Is Gray Box Testing In Cybersecurity? […]
The post Gray Box Testing in Cybersecurity: Finding the Right Balance for Security first appeared on StrongBox IT.
The post Gray Box Testing in Cybersecurity: Finding the Right Balance for Security appeared first on Security Boulevard.
CVE-2024-37129 | Dell Inventory Collector prior 12.3.0.6 path traversal (dsa-2024-263)
CVE-2024-37127 | Dell Peripheral Manager up to 1.7.5 Symbolic Links uncontrolled search path (dsa-2024-242)
CVE-2024-32857 | Dell Peripheral Manager up to 1.7.5 Symbolic Links uncontrolled search path (dsa-2024-242)
Ghostscript Vulnerability Actively Exploited in Attacks
A significant remote code execution (RCE) vulnerability was identified in the Ghostscript library, a widely used tool on Linux systems. This vulnerability, tracked as CVE-2024-29510, is currently being exploited in attacks, posing a severe risk to numerous applications and services. Ghostscript is a powerful and versatile tool used for processing PostScript and PDF files. It […]
The post Ghostscript Vulnerability Actively Exploited in Attacks appeared first on TuxCare.
The post Ghostscript Vulnerability Actively Exploited in Attacks appeared first on Security Boulevard.