Aggregator
CVE-2022-29081 | Zoho ManageEngine Access Manager Plus/Password Manager Pro/PAM360 /RestAPI access control
CVE-2022-40300 | Zoho ManageEngine Password Manager Pro/PAM360/Access Manager Plus sql injection
CVE-2024-57213 | TOTOLINK A6000R 1.0.1-B20201211.2000 action_passwd newpasswd command injection
CVE-2024-54996 | MonicaHQ 4.1.2 create title/description code injection
CVE-2024-52937 | Imagination Technologies Graphics DDK up to 24.2 RTM2 GPU Firmware out-of-range pointer offset
CVE-2025-22800 | Post SMTP Plugin up to 2.9.11 on WordPress authorization
CVE-2025-22583 | Anshul Sojatia Scan External Links Plugin up to 1.0 on WordPress cross site scripting
CVE-2025-22570 | Miloš Đekić Inline Tweets Plugin up to 2.0 on WordPress cross site scripting
CVE-2025-22586 | Detlef Stöver WPEX Replace DB Urls Plugin up to 0.4.0 on WordPress cross site scripting
CVE-2025-22588 | Scanventory Plugin up to 1.1.3 on WordPress cross site scripting
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions
Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent malware, bypass Transparency, Consent, and Control (TCC), and expand the attack surface to perform other unauthorized operations.
The post Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions appeared first on Microsoft Security Blog.
Attackers are encrypting AWS S3 data without using ransomware
A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used. They do not exfiltrate the data beforehand, but mark the encrypted files for deletion within seven days, thus adding more pressure on organizations to pay the ransom. How does the attack unfold? The threat actor leverages targets’ previous compromised (whether … More →
The post Attackers are encrypting AWS S3 data without using ransomware appeared first on Help Net Security.
UK domain registry Nominet confirms breach via Ivanti zero-day
Kim Dotcom Police Raid Video
How to generate safe, useful test data for Amazon Redshift
Amazon Redshift enables massive data warehousing capabilities, but creating quality mock data designed to mimic data stored in Redshift comes with significant challenges. Here are the problems involved and tools you need to tackle each with expertise.
The post How to generate safe, useful test data for Amazon Redshift appeared first on Security Boulevard.
Кошмар шопоголика: хакеры превращают WordPress-магазины в платёжный капкан
Telefonica Breach Exposes Jira Tickets, Customer Data
How to create realistic test data for Databricks with Tonic
Learn how to create realistic test data for Databricks with Tonic's latest integration! Yes, you read that right: We’re the only data masking and synthesis platform to offer a native streamlined Databricks integration.
The post How to create realistic test data for Databricks with Tonic appeared first on Security Boulevard.