Aggregator
深度解析:通过 AIBrix 多节点部署 DeepSeek-R1 671B 模型
1 year ago
再拓联营联运“朋友圈”,360在豫发力新质人才培养
1 year ago
联营联运推进数字安全和AI复合型人才培养
再拓联营联运“朋友圈”,360在豫发力新质人才培养
1 year ago
联营联运推进数字安全和AI复合型人才培养
深度解析:通过 AIBrix 多节点部署 DeepSeek-R1 671B 模型
1 year ago
限时¥399!Android逆向内核攻防实战进阶
1 year ago
核心聚焦于助力学员轻松掌握从内核态隐藏 frida 的技术,且全程无需重新编译内核。
2.43亿美元加密货币被盗案嫌犯"Wiz"落网
1 year ago
dotNET 动态脱壳技术要点
1 year ago
看雪论坛作者ID:htg
上海市普陀区政协调研360 政企协同共筑数字安全产业新高地
1 year ago
安全客
FreeBuf 早报 | Oracle客户证实云数据泄露数据真实有效;Splunk曝高危漏洞
1 year ago
多家公司确认,威胁行为者共享的相关数据样本真实有效。
Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!
1 year ago
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zero-click exploits, malicious Office files are still one of the easiest ways into a victim’s system.
Here are the top three Microsoft Office-based exploits still making the rounds this year and what you need to know to avoid them.
1.
The Hacker News
From Theory to Action: How dynamic benchmarking transforms cybersecurity readiness
1 year ago
Discover how dynamic benchmarking and CTF exercises can strengthen your security team in our Masterclass webinar, From Theory to Action. Stay ahead of evolving cyber threats!
CVE-2024-5223 | Post Grid Gutenberg Blocks and Blog Plugin up to 4.1.1 on WordPress cross site scripting
1 year ago
A vulnerability was found in Post Grid Gutenberg Blocks and Blog Plugin up to 4.1.1 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5223. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-3726 | Login Logout Register Menu Plugin up to 2.0 on WordPress Shortcode llrmloginlogout cross site scripting
1 year ago
A vulnerability was found in Login Logout Register Menu Plugin up to 2.0 on WordPress. It has been declared as problematic. This vulnerability affects the function llrmloginlogout of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-3726. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-2253 | Testimonial Carousel for Elementor Plugin up to 10.2.1 on WordPress cross site scripting
1 year ago
A vulnerability was found in Testimonial Carousel for Elementor Plugin up to 10.2.1 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-2253. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-35283 | Mitel MiContact Center Business up to 10.0.0.4 Ignite cross site scripting
1 year ago
A vulnerability, which was classified as problematic, was found in Mitel MiContact Center Business up to 10.0.0.4. This affects an unknown part of the component Ignite. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-35283. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-3943 | WP To Do Plugin up to 1.3.0 on WordPress wptodo_addcomment cross-site request forgery
1 year ago
A vulnerability classified as problematic has been found in WP To Do Plugin up to 1.3.0 on WordPress. This affects the function wptodo_addcomment. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-3943. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-3190 | Unlimited Elements for Elementor Plugin up to 1.5.107 on WordPress Text Field cross site scripting
1 year ago
A vulnerability was found in Unlimited Elements for Elementor Plugin up to 1.5.107 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Text Field Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-3190. The attack may be launched remotely. There is no exploit available.
vuldb.com
От разведки к разрушению: RedCurl меняет стратегию кибератак
1 year ago
Известная кибершпионская банда впервые применила вирус-вымогатель.
VMware 指控西门子盗版了它的软件
1 year ago
VMware 于 3 月 21 日向特拉华州地方法院起诉西门子美国子公司,指控这家工业巨头盗版了它的软件。VMware 称,自 2012 年 11 月 28 日起它就与西门子签署了 Master Software License and Service Agreement 协议。去年 9 月西门子向 VMware 寄去了一份维护和支持服务采购订单,寻求续订一年支持服务。但 VMware 发现西门子的清单包含了大量没有许可证订购记录的产品。为了避免西门子业务中断以及避免被告,VMware 同意了提供支持服务。诉讼称西门子抵制了 VMware 寻找在其系统上运行脚本以查明该公司运行多少 VMware 软件的尝试。