Aggregator
如何规避人工智能带来的政务服务风险
1 year ago
如何规避人工智能带来的政务服务风险
1 year ago
CrushFTP 认证绕过漏洞(CVE-2025-2825)
1 year ago
CrushFTP 认证绕过漏洞(CVE-2025-2825)
Resilience in the face of ransomware: A key to business survival
1 year ago
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
Второй шанс или вторая ошибка: разработчики настаивают на защите от вендор-экзита
1 year ago
Российский софт просит новых мер поддержки.
CVE-2025-31410 | Ashish Ajani WP Church Donation Plugin up to 1.7 on WordPress cross-site request forgery
1 year ago
A vulnerability classified as problematic was found in Ashish Ajani WP Church Donation Plugin up to 1.7 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2025-31410. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2025-31406 | ELEXtensions ELEX WooCommerce Request a Quote Plugin up to 2.3.3 on WordPress authorization
1 year ago
A vulnerability classified as problematic has been found in ELEXtensions ELEX WooCommerce Request a Quote Plugin up to 2.3.3 on WordPress. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-31406. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2025-2072 | FAST LTA Silent Brick WebUI prior 2.63.04 h/hd/p/pi/s/t/x/y cross site scripting
1 year ago
A vulnerability was found in FAST LTA Silent Brick WebUI. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument h/hd/p/pi/s/t/x/y leads to cross site scripting.
This vulnerability is handled as CVE-2025-2072. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-2071 | FAST LTA Silent Brick WebUI prior 2.63.04 hd/pi os command injection
1 year ago
A vulnerability was found in FAST LTA Silent Brick WebUI. It has been declared as very critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument hd/pi leads to os command injection.
This vulnerability is known as CVE-2025-2071. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
一周安全动态回顾:Chrome零日漏洞、IngressNightmare、太阳能设备漏洞与DNS攻击手法
1 year ago
Chrome零日漏洞遭利用,勒索软件升级,太阳能设备46漏洞威胁电网安全!
鱼也会使用工具
1 year ago
在公民科学项目 Fish Tool Use 的帮助下,科学家报告鱼也会使用工具,研究报告发表在《Coral Reefs》期刊上。这项研究否定了使用工具是哺乳动物和鸟类所独有的信念。研究记录了鱼类有意捡起螃蟹和软体动物等硬壳猎物,将它们砸向岩石等坚硬表面以打开外壳获取里面的肉。澳大利亚 Macquarie 大学的 Juliette Tariel-Adam 博士称,鱼能使用工具证明它比人类以为的更聪明。研究人员收集了五种海猪鱼属(Halichoeres)隆头鱼的 16 个新观察结果。
Конец эпохи электричества: Nvidia заставила фотоны служить искусственному интеллекту
1 year ago
Кто из техногигантов победит в битве за дата-центры будущего?
Оффшорная тень: как исчезающие компании нанимают элиту Кремниевой долины
1 year ago
Невидимая рука Китая тянется к мировым ИТ-гигантам.
Lessons from the Oracle and Coinbase Breaches
1 year ago
Proper secrets management could have prevented or reduced the impact of the Oracle Cloud & Coinbase breaches-- learn what steps you can take.
The post Lessons from the Oracle and Coinbase Breaches appeared first on Akeyless.
The post Lessons from the Oracle and Coinbase Breaches appeared first on Security Boulevard.
Miryam Brand
Morphing Meerkat phishing kits exploit DNS MX records
1 year ago
Morphing Meerkat phishing kits exploit DNS MX records to deliver spoofed login pages, targeting over 100 brands. Infoblox researchers discovered a new phishing-as-a-service (PhaaS) platform that generated multiple phishing kits, called Morphing Meerkat, using DNS mail exchange (MX) records to deliver fake login pages and targeting over 100 brands. Threat actors are exploiting DNS techniques […]
Pierluigi Paganini
US Seizes $8.2m from Romance Baiting Scammers
1 year ago
The DoJ has managed to recoup over $8m from scammers, stolen in romance baiting schemes
Война за маскулинность: TikTok разделился между агрессией и самоиронией
1 year ago
Студенты бросают вызов токсичным стереотипам через юмор и образование.
Dark Web Forum Post Claims Breach of Checkpoint Network
1 year ago
cohenido
What are CCPA Penalties for Violating Compliance Requirements?
1 year ago
Learn what CCPA penalties look like and how your business can avoid costly fines with the right compliance strategy.
The post What are CCPA Penalties for Violating Compliance Requirements? appeared first on Scytale.
The post What are CCPA Penalties for Violating Compliance Requirements? appeared first on Security Boulevard.
Tracy Boyes, Head of Privacy | Data Protection and Privacy Attorney, Scytale