Aggregator
CVE-2017-14531 | ImageMagick 7.0.7-0 coders/sun.c ReadSUNImage resource management (Issue 718 / Nessus ID 105409)
CVE-2014-6646 | bellyhoodcom 3.4.23 X.509 Certificate cryptographic issues (VU#582497)
Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks
CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security defenses, which can be used for various malicious activities like ransomware distribution, network scanning, lateral movement, and C2 establishment. It can mislead security personnel during investigations, leading to successful compromises. Organizations should use GreyMatter Hunt packages to establish […]
The post Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Navigating the Risks of Namespace Collision: A Critical Security Challenge
In today’s digital landscape, organizations face a multitude of cybersecurity threats, one of which is the often-overlooked issue of namespace collision. This vulnerability arises when internal domain names conflict with newly registered top-level domains (TLDs), exposing sensitive data to potential interception by malicious actors. This blog explores the nature of namespace collisions, their implications, and […]
The post Navigating the Risks of Namespace Collision: A Critical Security Challenge appeared first on Security Boulevard.
Microsoft Patch Tuesday security updates for September 2024 addressed four actively exploited zero-days
CVE-2014-6645 | Batch library X.509 Certificate cryptographic issues (VU#582497)
Chinese Hackers Linked To Syndicate Arrested In Singapore
When You Pay A Ransom And The Decryptor Doesn't Work
Researchers Hacked Car EV Chargers To Execute Arbitrary Code
Researchers discovered flaws in the Autel MaxiCharger EV charger that make it potential to execute arbitrary code on the device by just placing it within Bluetooth range. The vulnerabilities tracked as CVE-2024-23958, CVE-2024-23959, and CVE-2024-23967 were identified during Pwn2Own Automotive 2024 in Tokyo. The Autel MaxiCharger has significantly the most extensive hardware feature set, including […]
The post Researchers Hacked Car EV Chargers To Execute Arbitrary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.