Aggregator
CVE-2022-31643 | HP PC BIOS
CVE-2023-27035 | Obsidian Canvas 1.1.9 default permission
CVE-2022-35898 | OpenText BizManager up to 16.6.0.0 password recovery
CVE-2023-27108 | KaiOS 3.0 Communications Application information disclosure
CVE-2023-26987 | Konga 0.14.9 POST Request access control
CVE-2023-29635 | Antabot White-Jotter 0.2.2 coversUpload file unrestricted upload (Issue 157)
CVE-2022-48483 | 3CX Phone System 6.0.806.0/15.5.3554.1/16.0.0.1570 Drive Letter /Electron/download path traversal
2025-01-30: XLoader infection
Японские ученые обнаружили скрытую силу, влияющую на стабильность материи
CVE-2003-0226 | Microsoft IIS 5.0/5.1 WebDAV XML denial of service (MS03-018 / EDB-22670)
CVE-2013-7196 | PHPFox 3.7.3/3.7.4/3.7.5 val[item_id] access control (EDB-39139 / XFDB-92336)
Randall Munroe’s XKCD ‘Humidifier Review’
via the comic humor & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Humidifier Review’ appeared first on Security Boulevard.
Ransomware attack disrupts New York blood donation giant
"Жидкий свет" для микрочипов: российские ученые создали управляемые поляритоны
Did the Broadcom Acquisition of VMware Leave You Feeling High-and-Dry?
For NSX customers and partners who are Star Trek fans, VMware getting absorbed into the huge Broadcom product line might remind them of the Borg collective: “Resistance is Futile!” I lived through similar events when I was at IronPort, and we got purchased by Cisco. We were able to keep interest in the email security […]
The post Did the Broadcom Acquisition of VMware Leave You Feeling High-and-Dry? appeared first on ColorTokens.
The post Did the Broadcom Acquisition of VMware Leave You Feeling High-and-Dry? appeared first on Security Boulevard.
Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments
A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed by cybersecurity researchers. Introduced by James Forshaw and further developed using the Responder and krbrelayx tools, this approach exploits local name resolution protocols like LLMNR (Link-Local Multicast Name Resolution) to achieve pre-authenticated Kerberos relay attacks. This method provides a fresh […]
The post Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages
Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed “Tria Stealer,” which exploits fake wedding invitations to lure users into installing malicious apps (APK files). Malware Campaign Overview The campaign primarily targets users in Malaysia and Brunei, with Malaysia experiencing the most significant impact. Analysis indicates the operation originates from an […]
The post New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass, is facing scrutiny after the discovery of severe memory protection vulnerabilities in its products. Despite having established itself as a trusted name for safeguarding user data, these flaws could expose sensitive personal information, including encrypted VPN traffic and credit card […]
The post 500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
What is data privacy in healthcare? everything you need to know
Data privacy in healthcare is more important than ever, but few people fully understand how it works and why it’s necessary. Learn more about what data privacy in healthcare means and how medical organizations practice it in this detailed guide.
The post What is data privacy in healthcare? everything you need to know appeared first on Security Boulevard.