Aggregator
CVE-2009-1041 | FreeBSD 7.0/7.1/7.2 memory corruption (EDB-8261 / XFDB-49362)
CVE-2024-11672 | Devolutions Remote Desktop Manager up to 2024.2.21.0 on Windows Import in Vault authorization (DEVO-2024-0016)
CVE-2024-11671 | Devolutions Remote Desktop Manager up to 2024.3.17 on Windows SQL Data Source improper authentication (DEVO-2024-0016)
CVE-2024-11670 | Devolutions Remote Desktop Manager up to 2024.2.21.0 on Windows authorization (DEVO-2024-0015)
OWASP Top 10 for LLM adds risks: Get on target to secure your AI models
The post OWASP Top 10 for LLM adds risks: Get on target to secure your AI models appeared first on Security Boulevard.
Hexon Stealer: криптокошмар из Турции, обнуляющий кошельки за секунды
How to Reduce Risk From Exposed Secrets
Understand how secrets end up exposed, and how to prevent this risk.
The post How to Reduce Risk From Exposed Secrets appeared first on Security Boulevard.
恭喜系统软件与安全实验室6位同学顺利毕业!
Якудза настигает беглецов: утечка данных может стоить жизни тысячам жертв
【资讯】特朗普的20项核心承诺
CVE-2016-6664 | Oracle MySQL up to 5.5.51/5.6.32/5.7.14 File-based Logging mysqld_safe link following (RHSA-2017:2192 / EDB-40678)
Huge Leak of Customer Data Includes Military Personnel Info
EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote.
The post Huge Leak of Customer Data Includes Military Personnel Info appeared first on Security Boulevard.
ESET 研究人员公布了 Gelsemium 高级持续性威胁(APT)组织的 Linux 对应程序 WolfsBane
CVE-2022-24716 | Icinga Web up to 2.9.5 Configuration File path traversal (GHSA-5p3f-rh28-8frw / EDB-51329)
Closing the Cybersecurity Career Diversity Gap
Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims to fake login pages hosted on Weebly, targeting telecommunications and financial sectors in late October 2024. Financially motivated threat actors exploit Weebly’s ease of use and reputation to host phishing pages, bypassing security measures and leveraging the platform’s legitimacy to […]
The post Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.