Aggregator
CVE-2024-7333 | TOTOLINK N350RT 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi setParentalRules week/sTime/eTime buffer overflow
CVE-2024-7332 | TOTOLINK CP450 4.1.0cu.747_B20191224 Telnet Service product.ini hard-coded password
CVE-2024-7331 | TOTOLINK A3300R 17.0.0cu.557_B20221024 /cgi-bin/cstecgi.cgi UploadCustomModule File buffer overflow
Хакер показал, как всю жизнь бесплатно стирать одежду
New Specula Tool Turning Outlook as a C2 Server by Leveraging Registry
Cybersecurity firm TrustedSec has unveiled a powerful new tool called Specula. It exploits a longstanding vulnerability in Microsoft Outlook to transform it into a Command and Control (C2) server. This revelation has sent shockwaves through the cybersecurity community, highlighting a persistent weak point in many corporate networks. The Specula Framework Specula leverages a seemingly innocuous […]
The post New Specula Tool Turning Outlook as a C2 Server by Leveraging Registry appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-7330 | YouDianCMS 7 ydLib.php curl_exec url server-side request forgery
CVE-2024-7329 | YouDianCMS 7 image_upload.php files unrestricted upload
CVE-2024-7328 | YouDianCMS 7 /t.php information disclosure
Париж 2024: как приложения для болельщиков шпионят за гостями Олимпиады
CVE-2024-7327 | Xinhu RockOA 2.6.2 openmodhetongAction.php dataAction nickName sql injection
CVE-2024-7326 | IObit DualSafe Password Manager 1.4.0.3 BPL RTL120.BPL uncontrolled search path
CVE-2024-7325 | IObit Driver Booster 11.0.0.0 BPL VCL120.BPL uncontrolled search path
CVE-2024-7324 | IObit iTop Data Recovery Pro 4.4.0.687 BPL madbasic_.bpl uncontrolled search path
На телефон поступил одноразовый код? Похоже, он предназначен не для вас
Tenable Considering a Potential Sale: Report
Tenable reportedly is exploring a potential sale that would add to the growing consolidation in a cybersecurity market that is seeing new innovations in cyber-defenses as the threat of cyberattacks grows.
The post Tenable Considering a Potential Sale: Report appeared first on Security Boulevard.
Don’t Let Your Domain Name Become a “Sitting Duck”
美国军方发射了最后一枚使用俄罗斯引擎的火箭
Decoding Ransomware: The Power of Omnis Cyber Intelligence in Cyberdefense
8 supply chain security talks you don’t want to miss at Black Hat
Numerous reports have highlighted the increased number of software supply chain attacks in recent years. The Verizon Business Data Breach and Investigation Report (DBIR) 2024 concluded that breaches stemming from third-party software development organizations played a role in 15% of the more than 10,000 data breaches that Verizon documented, a 68% jump from last year. Additionally, ReversingLabs' The "State of Software Supply Chain Security 2024" noted that incidents of malicious packages found on popular open-source package managers have increased by 1,300% over the past three years (2020–2023).
The post 8 supply chain security talks you don’t want to miss at Black Hat appeared first on Security Boulevard.